Pass the CertNexus CyberSec First Responder (CFR) CFR-410 Questions and answers with CertsForce

Viewing page 5 out of 6 pages
Viewing questions 41-50 out of questions
Questions # 41:

Which three of the following are included in encryption architecture? (Choose three.)

Options:

A.

Certificate


B.

Encryption keys


C.

Encryption engine


D.

Database encryption


E.

Data


Expert Solution
Questions # 42:

An unauthorized network scan may be detected by parsing network sniffer data for:

Options:

A.

IP traffic from a single IP address to multiple IP addresses.


B.

IP traffic from a single IP address to a single IP address.


C.

IP traffic from multiple IP addresses to a single IP address.


D.

IP traffic from multiple IP addresses to other networks.


Expert Solution
Questions # 43:

During which of the following attack phases might a request sent to port 1433 over a whole company network be seen within a log?

Options:

A.

Reconnaissance


B.

Scanning


C.

Gaining access


D.

Persistence


Expert Solution
Questions # 44:

Which of the following is susceptible to a cache poisoning attack?

Options:

A.

Domain Name System (DNS)


B.

Secure Shell (SSH)


C.

Hypertext Transfer Protocol Secure (HTTPS)


D.

Hypertext Transfer Protocol (HTTP)


Expert Solution
Questions # 45:

What is the BEST process to identify the vendors that will ensure protection and compliance with security and privacy laws?

Options:

A.

Vulnerability assessment


B.

Risk assessment


C.

Penetration testing


D.

Security and privacy review


Expert Solution
Questions # 46:

Which of the following can increase an attack surface?

Options:

A.

Old or unused code


B.

Vulnerability scanning


C.

Mapping of an attack surface


D.

Penetration scanning


Expert Solution
Questions # 47:

A security analyst has discovered that an application has failed to run. Which of the following is the tool MOST

likely used by the analyst for the initial discovery?

Options:

A.

syslog


B.

MSConfig


C.

Event Viewer


D.

Process Monitor


Expert Solution
Questions # 48:

Which of the following regulations is most applicable to a public utility provider operating in the United States?

Options:

A.

GDPR


B.

NERC


C.

FISMA


D.

HIPAA


Expert Solution
Questions # 49:

Windows Server 2016 log files can be found in which of the following locations?

Options:

A.

C:\Windows\System\winevt\Logs


B.

C:\Windows\winevt\System32\Logs


C.

C:\Windows\System32\winevt\Logs


D.

C:\Windows\winevt\System\Logs


Expert Solution
Questions # 50:

Which of the following is considered a weakness or gap in a security program that can be exploited to gain unauthorized access?

Options:

A.

Risk


B.

Threat


C.

Asset


D.

Vulnerability


Expert Solution
Viewing page 5 out of 6 pages
Viewing questions 41-50 out of questions