Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

CFR-410 CyberSec First Responder (CFR) Exam Questions and Answers

Questions 4

A security investigator has detected an unauthorized insider reviewing files containing company secrets.

Which of the following commands could the investigator use to determine which files have been opened by this user?

Options:

A.

ls

B.

lsof

C.

ps

D.

netstat

Buy Now
Questions 5

A company help desk is flooded with calls regarding systems experiencing slow performance and certain Internet sites taking a long time to load or not loading at all. The security operations center (SOC) analysts who receive these calls take the following actions:

-Running antivirus scans on the affected user machines

-Checking department membership of affected users

-Checking the host-based intrusion prevention system (HIPS) console for affected user machine alerts

-Checking network monitoring tools for anomalous activities

Which of the following phases of the incident response process match the actions taken?

Options:

A.

Identification

B.

Preparation

C.

Recovery

D.

Containment

Buy Now
Questions 6

It was recently discovered that many of an organization’s servers were running unauthorized cryptocurrency mining software. Which of the following assets were being targeted in this attack? (Choose two.)

Options:

A.

Power resources

B.

Network resources

C.

Disk resources

D.

Computing resources

E.

Financial resources

Buy Now
Questions 7

An incident handler is assigned to initiate an incident response for a complex network that has been affected

by malware. Which of the following actions should be taken FIRST?

Options:

A.

Make an incident response plan.

B.

Prepare incident response tools.

C.

Isolate devices from the network.

D.

Capture network traffic for analysis.

Buy Now
Questions 8

Malicious code designed to execute in concurrence with a particular event is BEST defined as which of the following?

Options:

A.

Logic bomb

B.

Rootkit

C.

Trojan

D.

Backdoor

Buy Now
Questions 9

Which of the following types of attackers would be MOST likely to use multiple zero-day exploits executed against high-value, well-defended targets for the purposes of espionage and sabotage?

Options:

A.

Cybercriminals

B.

Hacktivists

C.

State-sponsored hackers

D.

Cyberterrorist

Buy Now
Questions 10

Which of the following methods are used by attackers to find new ransomware victims? (Choose two.)

Options:

A.

Web crawling

B.

Distributed denial of service (DDoS) attack

C.

Password guessing

D.

Phishing

E.

Brute force attack

Buy Now
Questions 11

After imaging a disk as part of an investigation, a forensics analyst wants to hash the image using a tool that supports piecewise hashing. Which of the following tools should the analyst use?

Options:

A.

md5sum

B.

sha256sum

C.

md5deep

D.

hashdeep

Buy Now
Questions 12

A network security analyst has noticed a flood of Simple Mail Transfer Protocol (SMTP) traffic to internal clients. SMTP traffic should only be allowed to email servers. Which of the following commands would stop this attack? (Choose two.)

Options:

A.

iptables -A INPUT -p tcp –dport 25 -d x.x.x.x -j ACCEPT

B.

iptables -A INPUT -p tcp –sport 25 -d x.x.x.x -j ACCEPT

C.

iptables -A INPUT -p tcp –dport 25 -j DROP

D.

iptables -A INPUT -p tcp –destination-port 21 -j DROP

E.

iptables -A FORWARD -p tcp –dport 6881:6889 -j DROP

Buy Now
Questions 13

During the forensic analysis of a compromised computer image, the investigator found that critical files are missing, caches have been cleared, and the history and event log files are empty. According to this scenario, which of the following techniques is the suspect using?

Options:

A.

System hardening techniques

B.

System optimization techniques

C.

Defragmentation techniques

D.

Anti-forensic techniques

Buy Now
Questions 14

Which of the following enables security personnel to have the BEST security incident recovery practices?

Options:

A.

Crisis communication plan

B.

Disaster recovery plan

C.

Occupant emergency plan

D.

Incident response plan

Buy Now
Questions 15

Detailed step-by-step instructions to follow during a security incident are considered:

Options:

A.

Policies

B.

Guidelines

C.

Procedures

D.

Standards

Buy Now
Exam Code: CFR-410
Exam Name: CyberSec First Responder (CFR) Exam
Last Update: Apr 23, 2024
Questions: 100
CFR-410 pdf

CFR-410 PDF

$28  $80
CFR-410 Engine

CFR-410 Testing Engine

$33.25  $95
CFR-410 PDF + Engine

CFR-410 PDF + Testing Engine

$45.5  $130