Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CertNexus CFR-410 - CyberSec First Responder (CFR) Exam

Page: 4 / 6
Total 180 questions

While planning a vulnerability assessment on a computer network, which of the following is essential? (Choose two.)

A.

Identifying exposures

B.

Identifying critical assets

C.

Establishing scope

D.

Running scanning tools

E.

Installing antivirus software

Tcpdump is a tool that can be used to detect which of the following indicators of compromise?

A.

Unusual network traffic

B.

Unknown open ports

C.

Poor network performance

D.

Unknown use of protocols

What allows a company to restore normal business operations in a matter of minutes or seconds?

A.

Cold site

B.

Warm site

C.

Mobile site

D.

Hot site

Organizations considered “covered entities” are required to adhere to which compliance requirement?

A.

Health Insurance Portability and Accountability Act of 1996 (HIPAA)

B.

Payment Card Industry Data Security Standard (PCI DSS)

C.

Sarbanes-Oxley Act (SOX)

D.

International Organization for Standardization (ISO) 27001

A first responder notices a file with a large amount of clipboard information stored in it. Which part of the MITRE ATT&CK matrix has the responder discovered?

A.

Collection

B.

Discovery

C.

Lateral movement

D.

Exfiltration

Which of the following is a cybersecurity solution for insider threats to strengthen information protection?

A.

Web proxy

B.

Data loss prevention (DLP)

C.

Anti-malware

D.

Intrusion detection system (IDS)

Which three disk image formats are used for evidence collection and preservation? (Choose three.)

A.

RAW(DD)

B.

E01

C.

AFF

D.

APFS

E.

EXT4

During a malware-driven distributed denial of service attack, a security researcher found excessive requests to a name server referring to the same domain name and host name encoded in hexadecimal. The malware author used which type of command and control?

A.

Internet Relay Chat (IRC)

B.

Dnscat2

C.

Custom channel

D.

File Transfer Protocol (FTP)

Which service is commonly found on port 3306?

A.

BitTorrent

B.

MySQL

C.

MS-RPC

D.

Oracle SQL*Net Listener

Which answer option is a tactic of social engineering in which an attacker engages in an attack performed by phone?

A.

Smishing

B.

Pretexting

C.

Vishing

D.

Phishing