Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CFR-410 Exam Dumps - CyberSec First Responder (CFR) Exam

Go to page:
Question # 25

Which of the following, when exposed together, constitutes PII? (Choose two.)

A.

Full name

B.

Birth date

C.

Account balance

D.

Marital status

E.

Employment status

Full Access
Question # 26

Organizations considered “covered entities” are required to adhere to which compliance requirement?

A.

Health Insurance Portability and Accountability Act of 1996 (HIPAA)

B.

Payment Card Industry Data Security Standard (PCI DSS)

C.

Sarbanes-Oxley Act (SOX)

D.

International Organization for Standardization (ISO) 27001

Full Access
Question # 27

During the forensic analysis of a compromised computer image, the investigator found that critical files are missing, caches have been cleared, and the history and event log files are empty. According to this scenario, which of the following techniques is the suspect using?

A.

System hardening techniques

B.

System optimization techniques

C.

Defragmentation techniques

D.

Anti-forensic techniques

Full Access
Question # 28

Which of the following describes United States federal government cybersecurity policies and guidelines?

A.

NIST

B.

ANSI

C.

NERC

D.

GDPR

Full Access
Question # 29

A Linux administrator is trying to determine the character count on many log files. Which of the following command and flag combinations should the administrator use?

A.

tr -d

B.

uniq -c

C.

wc -m

D.

grep -c

Full Access
Question # 30

A company help desk is flooded with calls regarding systems experiencing slow performance and certain Internet sites taking a long time to load or not loading at all. The security operations center (SOC) analysts who receive these calls take the following actions:

-Running antivirus scans on the affected user machines

-Checking department membership of affected users

-Checking the host-based intrusion prevention system (HIPS) console for affected user machine alerts

-Checking network monitoring tools for anomalous activities

Which of the following phases of the incident response process match the actions taken?

A.

Identification

B.

Preparation

C.

Recovery

D.

Containment

Full Access
Question # 31

When performing a vulnerability assessment from outside the perimeter, which of the following network devices is MOST likely to skew the scan results?

A.

Access Point

B.

Router

C.

Firewall

D.

IDS

E.

Switch

Full Access
Question # 32

A security administrator is investigating a compromised host. Which of the following commands could the investigator use to display executing processes in real time?

A.

ps

B.

top

C.

nice

D.

pstree

Full Access
Go to page: