Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CFR-210 Exam Dumps - Logical Operations CyberSec First Responder

Go to page:
Question # 9

A SOC analyst reviews vendor security bulletins and security blog articles against the company’s deployed system and software base. Based on current attack patterns, three vulnerabilities, including a zero-day vulnerability, have been upgraded to high priority. Which of the following should the SOC analyst recommend? (Choose two.)

A.

Reboot affected servers

B.

Implement DNS filtering

C.

Update IPS rules

D.

Implement application whitelisting

E.

Patch affected systems

Full Access
Question # 10

Drag and drop the following steps to perform a successful social engineering attack in the correct order, from first (1) to last (6).

Full Access
Question # 11

An incident responder is asked to create a disk image of a compromised Linux server. Which of the following commands should be used to do this?

A.

dd

B.

Isof

C.

gzip

D.

fdisk

E.

mbr

Full Access
Question # 12

Which of the following resources BEST supports malware analysis?

A.

Internet service providers

B.

Government websites

C.

Crowdsourced intelligence feed

D.

Internal network management team

Full Access
Question # 13

An attacker has decided to attempt a brute force attack on a UNIX server. In order to accomplish this, which of the following steps must be performed?

A.

Exfiltrate the shadow and SAM, run unshadow, and then runa password cracking utility on the output file.

B.

Exfiltrate the shadow and passwd, and then run a password cracking utility on both files.

C.

Exfiltrate the shadow and SAM, and then run a password cracking utility on both files.

D.

Exfiltrate the shadowand passwd, run unshadow, and then run a password cracking utility on the output file.

Full Access
Question # 14

Which of the following technologies is used as mitigation to XSS attacks?

A.

Intrusion prevention

B.

Proxy filtering

C.

Web application firewall

D.

Intrusion detection

Full Access
Question # 15

An attack was performed on a company’s web server, disabling the company’s website. The incident response team’s investigation produced the following:

1. Presence of malicious code installed on employees’ workstations.

2. Excessive UDP datagrams sent to a single address.

3. Web server received excessive UDP datagrams from multiple internal hosts.

4. Network experienced high traffic after 3:00 pm.

5. Employee workstations sent large traffic bursts when employees accessed the internal timecard application.

Which of the following BEST describes the attack tool used to perform the attack?

A.

KeyLogger

B.

Logic bomb

C.

Nessus

D.

Metasploit

Full Access
Go to page: