Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CFR-410 Exam Dumps - CyberSec First Responder (CFR) Exam

Go to page:
Question # 17

A web server is under a denial of service (DoS) attack. The administrator reviews logs and creates an access control list (ACL) to stop the attack. Which of the following technologies could perform these steps automatically in the future?

A.

Intrusion prevention system (IPS)

B.

Intrusion detection system (IDS)

C.

Blacklisting

D.

Whitelisting

Full Access
Question # 18

After successfully enumerating the target, the hacker determines that the victim is using a firewall. Which of the following techniques would allow the hacker to bypass the intrusion prevention system (IPS)?

A.

Stealth scanning

B.

Xmas scanning

C.

FINS scanning

D.

Port scanning

Full Access
Question # 19

A forensic analyst has been tasked with analyzing disk images with file extensions such as .001, .002, etc. Which of the following disk imaging tools was MOST LIKELY used to create these image files?

A.

Encase

B.

ExifTool

C.

SIFT

D.

FTK

E.

dd

Full Access
Question # 20

Which of the following characteristics of a web proxy strengthens cybersecurity? (Choose two.)

A.

Increases browsing speed

B.

Filters unwanted content

C.

Limits direct connection to Internet

D.

Caches frequently-visited websites

E.

Decreases wide area network (WAN) traffic

Full Access
Question # 21

Which three tools are used for integrity verification of files? (Choose three.)

A.

sha256sum

B.

ent

C.

pgp32

D.

md5sum

E.

md5deep

Full Access
Question # 22

Which of the following is the FIRST step taken to maintain the chain of custody in a forensic investigation?

A.

Security and evaluating the electronic crime scene.

B.

Transporting the evidence to the forensics lab

C.

Packaging the electronic device

D.

Conducting preliminary interviews

Full Access
Question # 23

During an incident, the following actions have been taken:

-Executing the malware in a sandbox environment

-Reverse engineering the malware

-Conducting a behavior analysis

Based on the steps presented, which of the following incident handling processes has been taken?

A.

Containment

B.

Eradication

C.

Recovery

D.

Identification

Full Access
Question # 24

Nmap is a tool most commonly used to:

A.

Map a route for war-driving

B.

Determine who is logged onto a host

C.

Perform network and port scanning

D.

Scan web applications

Full Access
Go to page: