CertNexus CFR-410 - CyberSec First Responder (CFR) Exam
A system administrator identifies unusual network traffic from outside the local network. Which of the following
is the BEST method for mitigating the threat?
While performing routing maintenance on a Windows Server, a technician notices several unapproved Windows Updates and that remote access software has been installed. The technician suspects that a malicious actor has gained access to the system. Which of the following steps in the attack process does this activity indicate?
After successfully enumerating the target, the hacker determines that the victim is using a firewall. Which of the following techniques would allow the hacker to bypass the intrusion prevention system (IPS)?
To minimize vulnerability, which steps should an organization take before deploying a new Internet of Things (IoT) device? (Choose two.)
During which phase of the incident response process should an organization develop policies and procedures for incident handling?
Which of the following can be used as a vulnerability management and assessment tool?
An attacker intercepts a hash and compares it to pre-computed hashes to crack a password. Which of the following methods has been used?
Which approach to cybersecurity involves a series of defensive mechanisms that are layered to protect valuable data and information?
What is the primary purpose of the "information security incident triage and processing function" in the (CSIRT) Computer Security Incident Response Team Services Framework?
Which of the following backup strategies will result in the shortest backup time during weekdays and use the least amount of storage space but incur the longest restore time?