Pass the CertNexus CyberSec First Responder (CFR) CFR-410 Questions and answers with CertsForce

Viewing page 4 out of 6 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which of the following is the FIRST step taken to maintain the chain of custody in a forensic investigation?

Options:

A.

Security and evaluating the electronic crime scene.


B.

Transporting the evidence to the forensics lab


C.

Packaging the electronic device


D.

Conducting preliminary interviews


Expert Solution
Questions # 32:

Which two mitigation strategies can prevent an attack delivered via malware? (Choose two.)

Options:

A.

Daily backups


B.

Raising user awareness


C.

Implementing IDS


D.

Application patching


E.

Multi-factor authentication


Expert Solution
Questions # 33:

A Linux system administrator found suspicious activity on host IP 192.168.10.121. This host is also establishing a connection to IP 88.143.12.123. Which of the following commands should the administrator use to capture only the traffic between the two hosts?

Options:

A.

# tcpdump -i eth0 host 88.143.12.123


B.

# tcpdump -i eth0 dst 88.143.12.123


C.

# tcpdump -i eth0 host 192.168.10.121


D.

# tcpdump -i eth0 src 88.143.12.123


Expert Solution
Questions # 34:

How does encryption work to protect information on remote workers' computers?

Options:

A.

It is difficult to set up, so an unskilled attacker won't be able to figure it out.


B.

Without the proper key, an attacker won't be able to unscramble the encrypted information.


C.

Using encryption requires advanced training in mathematics, which is beyond the capabilities of most attackers.


D.

Information can be encrypted but it can never be decrypted leaving an attacker unable to read the information


Expert Solution
Questions # 35:

A company has noticed a trend of attackers gaining access to corporate mailboxes. Which of the following

would be the BEST action to take to plan for this kind of attack in the future?

Options:

A.

Scanning email server for vulnerabilities


B.

Conducting security awareness training


C.

Hardening the Microsoft Exchange Server


D.

Auditing account password complexity


Expert Solution
Questions # 36:

A system administrator has been tasked with developing highly detailed instructions for patching managed assets using the corporate patch management solution. These instructions are an example of which of the following?

Options:

A.

Process


B.

Procedure


C.

Standard


D.

Policy


Expert Solution
Questions # 37:

Which of the following data sources could provide indication of a system compromise involving the exfiltration of data to an unauthorized destination?

Options:

A.

IPS logs


B.

DNS logs


C.

SQL logs


D.

SSL logs


Expert Solution
Questions # 38:

While planning a vulnerability assessment on a computer network, which of the following is essential? (Choose two.)

Options:

A.

Identifying exposures


B.

Identifying critical assets


C.

Establishing scope


D.

Running scanning tools


E.

Installing antivirus software


Expert Solution
Questions # 39:

The Key Reinstallation Attack (KRACK) vulnerability is specific to which types of devices? (Choose two.)

Options:

A.

Wireless router


B.

Switch


C.

Firewall


D.

Access point


E.

Hub


Expert Solution
Questions # 40:

A secretary receives an email from a friend with a picture of a kitten in it. The secretary forwards it to the

~COMPANYWIDE mailing list and, shortly thereafter, users across the company receive the following message:

“You seem tense. Take a deep breath and relax!”

The incident response team is activated and opens the picture in a virtual machine to test it. After a short analysis, the following code is found in C:

\Temp\chill.exe:Powershell.exe –Command “do {(for /L %i in (2,1,254) do shutdown /r /m Error! Hyperlink reference not valid.> /f /t / 0 (/c “You seem tense. Take a deep breath and relax!”);Start-Sleep –s 900) } while(1)”

Which of the following BEST represents what the attacker was trying to accomplish?

Options:

A.

Taunt the user and then trigger a shutdown every 15 minutes.


B.

Taunt the user and then trigger a reboot every 15 minutes.


C.

Taunt the user and then trigger a shutdown every 900 minutes.


D.

Taunt the user and then trigger a reboot every 900 minutes.


Expert Solution
Viewing page 4 out of 6 pages
Viewing questions 31-40 out of questions