Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CertNexus CFR-410 - CyberSec First Responder (CFR) Exam

Page: 1 / 6
Total 180 questions

A system administrator identifies unusual network traffic from outside the local network. Which of the following

is the BEST method for mitigating the threat?

A.

Malware scanning

B.

Port blocking

C.

Packet capturing

D.

Content filtering

While performing routing maintenance on a Windows Server, a technician notices several unapproved Windows Updates and that remote access software has been installed. The technician suspects that a malicious actor has gained access to the system. Which of the following steps in the attack process does this activity indicate?

A.

Expanding access

B.

Covering tracks

C.

Scanning

D.

Persistence

After successfully enumerating the target, the hacker determines that the victim is using a firewall. Which of the following techniques would allow the hacker to bypass the intrusion prevention system (IPS)?

A.

Stealth scanning

B.

Xmas scanning

C.

FINS scanning

D.

Port scanning

To minimize vulnerability, which steps should an organization take before deploying a new Internet of Things (IoT) device? (Choose two.)

A.

Changing the default password

B.

Updating the device firmware

C.

Setting up new users

D.

Disabling IPv6

E.

Enabling the firewall

During which phase of the incident response process should an organization develop policies and procedures for incident handling?

A.

Containment

B.

Preparation

C.

Identification

D.

Recovery

Which of the following can be used as a vulnerability management and assessment tool?

A.

Nessus

B.

THC Hydra

C.

Cain & Abel

D.

John the Ripper

An attacker intercepts a hash and compares it to pre-computed hashes to crack a password. Which of the following methods has been used?

A.

Password sniffing

B.

Brute force attack

C.

Rainbow tables

D.

Dictionary attack

Which approach to cybersecurity involves a series of defensive mechanisms that are layered to protect valuable data and information?

A.

Network segmentation

B.

Defense in depth

C.

Tiered security

D.

Endpoint detection and response

What is the primary purpose of the "information security incident triage and processing function" in the (CSIRT) Computer Security Incident Response Team Services Framework?

A.

To analyze and gain an understanding of a confirmed information security incident.

B.

To initially review, categorize, prioritize, and process a reported information security incident.

C.

To receive and process reports of potential information security incidents from constituents, Information Security Event Management services, or third parties.

D.

To accept or receive information about an information security incident, as reported from constituents or third parties.

Which of the following backup strategies will result in the shortest backup time during weekdays and use the least amount of storage space but incur the longest restore time?

A.

Full weekly backup with daily differential backups.

B.

Mirror backups on a daily basis.

C.

Full backups on a daily basis.

D.

Full weekly backup with daily incremental backups.