CertNexus CFR-410 - CyberSec First Responder (CFR) Exam
What term means that data is valid and not corrupt?
Which of the following tools can be used as an intrusion detection system (IDS)? (Choose three.)
A security administrator needs to review events from different systems located worldwide. Which of the
following is MOST important to ensure that logs can be effectively correlated?
A security operations center (SOC) analyst observed an unusually high number of login failures on a particular database server. The analyst wants to gather supporting evidence before escalating the observation to management. Which of the following expressions will provide login failure data for 11/24/2015?
Network infrastructure has been scanned and the identified issues have been remediated. What is the next step in the vulnerability assessment process?
What is baseline security?
Which of the following attack vectors capitalizes on a previously undisclosed issue with a software application?
A company help desk is flooded with calls regarding systems experiencing slow performance and certain Internet sites taking a long time to load or not loading at all. The security operations center (SOC) analysts who receive these calls take the following actions:
-Running antivirus scans on the affected user machines
-Checking department membership of affected users
-Checking the host-based intrusion prevention system (HIPS) console for affected user machine alerts
-Checking network monitoring tools for anomalous activities
Which of the following phases of the incident response process match the actions taken?
Which of the following types of attackers would be MOST likely to use multiple zero-day exploits executed against high-value, well-defended targets for the purposes of espionage and sabotage?
Which of the following is an essential component of a disaster recovery plan?