Pass the CertNexus CyberSec First Responder (CFR) CFR-410 Questions and answers with CertsForce

Viewing page 2 out of 6 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following actions should be done by the incident response team after completing the recovery phase of the cyber incident caused by malware?

Options:

A.

Eradicate the malware.


B.

Conduct lessons learned.


C.

Isolate the malware from the system.


D.

Collect evidence for the lawsuit.


E.

Analyze the behavior of the malware.


Expert Solution
Questions # 12:

Which two answer options are the BEST reasons to conduct post-incident reviews after an incident occurs in an organization? (Choose two.)

Options:

A.

To help leverage automated scanning tools and ad hoc tests


B.

To help identify lessons learned and follow-up action.


C.

To help identify event detection information.


D.

To help prevent an incident recurrence.


Expert Solution
Questions # 13:

An organization was recently hit with a ransomware attack that encrypted critical documents and files that were stored on the corporate file server.

Which of the following provides the organization with the BEST chance for recovering their data?

Options:

A.

Application white listing!


B.

Antivirus software


C.

Paying the ransom


D.

Offsite backups


Expert Solution
Questions # 14:

A company that maintains a public city infrastructure was breached and information about future city projects was leaked. After the post-incident phase of the process has been completed, which of the following would be

PRIMARY focus of the incident response team?

Options:

A.

Restore service and eliminate the business impact.


B.

Determine effective policy changes.


C.

Inform the company board about the incident.


D.

Contact the city police for official investigation.


Expert Solution
Questions # 15:

A Windows system administrator has received notification from a security analyst regarding new malware that executes under the process name of “armageddon.exe” along with a request to audit all department workstations for its presence. In the absence of GUI-based tools, what command could the administrator execute to complete this task?

Options:

A.

ps -ef | grep armageddon


B.

top | grep armageddon


C.

wmic process list brief | find “armageddon.exe”


D.

wmic startup list full | find “armageddon.exe”


Expert Solution
Questions # 16:

Which of the following methods are used by attackers to find new ransomware victims? (Choose two.)

Options:

A.

Web crawling


B.

Distributed denial of service (DDoS) attack


C.

Password guessing


D.

Phishing


E.

Brute force attack


Expert Solution
Questions # 17:

Which of the following could be useful to an organization that wants to test its incident response procedures without risking any system downtime?

Options:

A.

Blue team exercise


B.

Business continuity exercise


C.

Tabletop exercise


D.

Red team exercise


Expert Solution
Questions # 18:

If a hacker is attempting to alter or delete system audit logs, in which of the following attack phases is the hacker involved?

Options:

A.

Covering tracks


B.

Expanding access


C.

Gaining persistence


D.

Performing reconnaissance


Expert Solution
Questions # 19:

During the forensic analysis of a compromised computer image, the investigator found that critical files are missing, caches have been cleared, and the history and event log files are empty. According to this scenario, which of the following techniques is the suspect using?

Options:

A.

System hardening techniques


B.

System optimization techniques


C.

Defragmentation techniques


D.

Anti-forensic techniques


Expert Solution
Questions # 20:

Which of the following is a method of reconnaissance in which a ping is sent to a target with the expectation of receiving a response?

Options:

A.

Active scanning


B.

Passive scanning


C.

Network enumeration


D.

Application enumeration


Expert Solution
Viewing page 2 out of 6 pages
Viewing questions 11-20 out of questions