Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CFR-410 Exam Dumps - CyberSec First Responder (CFR) Exam

Go to page:
Question # 9

An attacker intercepts a hash and compares it to pre-computed hashes to crack a password. Which of the following methods has been used?

A.

Password sniffing

B.

Brute force attack

C.

Rainbow tables

D.

Dictionary attack

Full Access
Question # 10

What kind of measures and controls are implemented when employees get assigned personal, unique badges when they join the organization, and they remain valid until the employee's last day of work?

A.

Human resources security

B.

Communications security

C.

Physical security

D.

Operations security

Full Access
Question # 11

While planning a vulnerability assessment on a computer network, which of the following is essential? (Choose two.)

A.

Identifying exposures

B.

Identifying critical assets

C.

Establishing scope

D.

Running scanning tools

E.

Installing antivirus software

Full Access
Question # 12

Which of the following is an essential component of a disaster recovery plan?

A.

Memorandums of agreement with vendors

B.

Product service agreements

C.

A dedicated incident response team

D.

Complete hardware and software inventories

Full Access
Question # 13

Which of the following actions should be done by the incident response team after completing the recovery phase of the cyber incident caused by malware?

A.

Eradicate the malware.

B.

Conduct lessons learned.

C.

Isolate the malware from the system.

D.

Collect evidence for the lawsuit.

E.

Analyze the behavior of the malware.

Full Access
Question # 14

A Windows system administrator has received notification from a security analyst regarding new malware that executes under the process name of “armageddon.exe” along with a request to audit all department workstations for its presence. In the absence of GUI-based tools, what command could the administrator execute to complete this task?

A.

ps -ef | grep armageddon

B.

top | grep armageddon

C.

wmic process list brief | find “armageddon.exe”

D.

wmic startup list full | find “armageddon.exe”

Full Access
Question # 15

Which of the following are part of the hardening phase of the vulnerability assessment process? (Choose two.)

A.

Installing patches

B.

Updating configurations

C.

Documenting exceptions

D.

Conducting audits

E.

Generating reports

Full Access
Question # 16

The "right to be forgotten" is considered a core tenet of which of the following privacy-focused acts or regulations?

A.

GDPR

B.

CCPA

C.

PPA

D.

HIPPA

E.

COPPA

Full Access
Go to page: