Pass the CertNexus CyberSec First Responder (CFR) CFR-410 Questions and answers with CertsForce

Viewing page 3 out of 6 pages
Viewing questions 21-30 out of questions
Questions # 21:

A suspicious script was found on a sensitive research system. Subsequent analysis determined that proprietary data would have been deleted from both the local server and backup media immediately following a specific administrator’s removal from an employee list that is refreshed each evening. Which of the following BEST describes this scenario?

Options:

A.

Backdoor


B.

Rootkit


C.

Time bomb


D.

Login bomb


Expert Solution
Questions # 22:

While performing routing maintenance on a Windows Server, a technician notices several unapproved Windows Updates and that remote access software has been installed. The technician suspects that a malicious actor has gained access to the system. Which of the following steps in the attack process does this activity indicate?

Options:

A.

Expanding access


B.

Covering tracks


C.

Scanning


D.

Persistence


Expert Solution
Questions # 23:

Which are successful Disaster Recovery Plan best practices options to be considered? (Choose three.)

Options:

A.

Isolate the services and data as much as possible.


B.

Back up to a NAS device that is attached 24 hours a day, 7 days a week.


C.

Understand which processes are critical to the business and have to run in disaster recovery.


D.

Maintain integrity between primary and secondary deployments.


E.

Store any data elements in the root storage that is used for root access for the workspace.


Expert Solution
Questions # 24:

When tracing an attack to the point of origin, which of the following items is critical data to map layer 2 switching?

Options:

A.

DNS cache


B.

ARP cache


C.

CAM table


D.

NAT table


Expert Solution
Questions # 25:

In a Linux operating system, what kind of information does a /var/log/daemon.log file contain?

Options:

A.

Debug-related messages


B.

Various system background processes


C.

System messages


D.

User password


Expert Solution
Questions # 26:

A security administrator is investigating a compromised host. Which of the following commands could the investigator use to display executing processes in real time?

Options:

A.

ps


B.

top


C.

nice


D.

pstree


Expert Solution
Questions # 27:

Which of the following security best practices should a web developer reference when developing a new web- based application?

Options:

A.

Control Objectives for Information and Related Technology (COBIT)


B.

Risk Management Framework (RMF)


C.

World Wide Web Consortium (W3C)


D.

Open Web Application Security Project (OWASP)


Expert Solution
Questions # 28:

Tcpdump is a tool that can be used to detect which of the following indicators of compromise?

Options:

A.

Unusual network traffic


B.

Unknown open ports


C.

Poor network performance


D.

Unknown use of protocols


Expert Solution
Questions # 29:

During a security investigation, a suspicious Linux laptop is found in the server room. The laptop is processing information and indicating network activity. The investigator is preparing to launch an investigation to

determine what is happening with this laptop. Which of the following is the MOST appropriate set of Linux commands that should be executed to conduct the investigation?

Options:

A.

iperf, traceroute, whois, ls, chown, cat


B.

iperf, wget, traceroute, dc3dd, ls, whois


C.

lsof, chmod, nano, whois, chown, ls


D.

lsof, ifconfig, who, ps, ls, tcpdump


Expert Solution
Questions # 30:

Malicious code designed to execute in concurrence with a particular event is BEST defined as which of the following?

Options:

A.

Logic bomb


B.

Rootkit


C.

Trojan


D.

Backdoor


Expert Solution
Viewing page 3 out of 6 pages
Viewing questions 21-30 out of questions