Pass the Logical Operations CyberSec First Responder CFR-210 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

A DMZ web server has been compromised. During the log review, the incident responder wants to parse all common internal Class A addresses from the log. Which of the following commands should the responder use to accomplish this?

Options:

A.

grep –x”(10.[0-9]+.[0-9]+.[0-9]+)” etc/rc.d/apache2/access.log | output.txt


B.

grep –x”(192.168.[0.9]+[0-9])” bin/apache2/access.log | output.txt


C.

grep –v”(10.[0-9]+.[0-9]+.[0-9]+)” /var/log/apache2/access.log > output.txt


D.

grep –v”(192.168.[0.9]+[0-9]+)” /var/log/apache2/access.log > output.txt


Questions # 2:

An intruder gains physical access to a company’s headquarters. The intruder is able to access the company’s network via a visitor’s office. The intruder sets up an attack device, under the visitor’s office desk, that impersonates the corporate wireless network. Users at headquarters begin to notice slow browsing speeds from their company laptops. Which of the following attacks is MOST likely occurring?

Options:

A.

Man-in-the-middle


B.

Denial of service


C.

Social engineering


D.

ARP table poisoning


Questions # 3:

A high-level government official uses anonymous bank accounts to transfer a requested amount of funds to individuals in another country. These individuals are known for defacing government websites and exfiltrating sensitive data. Which of the following BEST describes the involved threat actors?

Options:

A.

State-sponsored hackers


B.

Gray hat hackers


C.

Hacktivists


D.

Cyber terrorists


Questions # 4:

Drag and drop the following steps to perform a successful social engineering attack in the correct order, from first (1) to last (6).

Question # 4


Questions # 5:

A malicious attacker has compromised a database by implementing a Python-based script that will automatically establish an SSH connection daily between the hours of 2:00 am and 5:00 am. Which of the following is the MOST common motive for the attack vector that was used?

Options:

A.

Pivoting


B.

Persistence/maintaining access


C.

Exfiltration


D.

Lateral movement


Questions # 6:

During review of a company’s web server logs, the following items are discovered:

2015-03-01 03:32:11 www.example.com/index.asp?id=-999 or 1=convert(int,@@version)—

2015-03-01 03:35:33 www.example.com/index.asp?id=-999 or 1=convert(int,db_name())—

2015-03-01 03:38:25 www.example.com/index.asp?id=-999 or 1=convert(int,user_name())—

Which of the following is depicted in the log example above?

Options:

A.

An administrator using the web interface for application maintenance


B.

Normal web application traffic


C.

A web application scan


D.

An attempt at enumeration via SQL injection


Questions # 7:

An incident responder is asked to create a disk image of a compromised Linux server. Which of the following commands should be used to do this?

Options:

A.

dd


B.

Isof


C.

gzip


D.

fdisk


E.

mbr


Questions # 8:

As part of an incident response effort, data has been collected and analyzed, and a malware infection has been contained. Which of the following is the NEXT step the incident response team should take within the incident response process?

Options:

A.

Begin recovering all infected systems to return the organization to normal operations as soon as possible.


B.

Ensure every instance of the malware has been removed across the organization.


C.

Discuss lessons learned before proceeding with other steps.


D.

Start writing the report to ensure a quality product is delivered by the end of the project.


Questions # 9:

When investigating a wireless attack, which of the following can be obtained from the DHCP server?

Options:

A.

MAC address of the attacker


B.

Operating system of the attacker


C.

IP traffic between the attacker and victim


D.

Effectiveness of the VLAN terminator


Questions # 10:

A user reports a pop-up error when starting a Windows machine. The error states that the machine has been infected with a virus and instructs the user to download a new antivirus client. In which of the following locations should the incidentresponder check to find what is generating the error message? (Choose two.)

Options:

A.

Auto-start registry keys


B.

Device Manager


C.

Event Viewer


D.

Programs and Features


E.

Browser history


Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions