Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CFR-410 Exam Dumps - CyberSec First Responder (CFR) Exam

Go to page:
Question # 33

Vulnerability scanners generally classify vulnerabilities by which of the following? (Choose two.)

A.

Exploit range

B.

Costs

C.

Severity level

D.

Zero days

E.

Threat modeling

Full Access
Question # 34

After a security breach, a security consultant is hired to perform a vulnerability assessment for a company’s web application. Which of the following tools would the consultant use?

A.

Nikto

B.

Kismet

C.

tcpdump

D.

Hydra

Full Access
Question # 35

A security analyst is required to collect detailed network traffic on a virtual machine. Which of the following tools could the analyst use?

A.

nbtstat

B.

WinDump

C.

fport

D.

netstat

Full Access
Question # 36

Which asset would be the MOST desirable for a financially motivated attacker to obtain from a health insurance company?

A.

Transaction logs

B.

Intellectual property

C.

PII/PHI

D.

Network architecture

Full Access
Question # 37

After imaging a disk as part of an investigation, a forensics analyst wants to hash the image using a tool that supports piecewise hashing. Which of the following tools should the analyst use?

A.

md5sum

B.

sha256sum

C.

md5deep

D.

hashdeep

Full Access
Question # 38

An organization was recently hit with a ransomware attack that encrypted critical documents and files that were stored on the corporate file server.

Which of the following provides the organization with the BEST chance for recovering their data?

A.

Application white listing!

B.

Antivirus software

C.

Paying the ransom

D.

Offsite backups

Full Access
Question # 39

During a security investigation, a suspicious Linux laptop is found in the server room. The laptop is processing information and indicating network activity. The investigator is preparing to launch an investigation to

determine what is happening with this laptop. Which of the following is the MOST appropriate set of Linux commands that should be executed to conduct the investigation?

A.

iperf, traceroute, whois, ls, chown, cat

B.

iperf, wget, traceroute, dc3dd, ls, whois

C.

lsof, chmod, nano, whois, chown, ls

D.

lsof, ifconfig, who, ps, ls, tcpdump

Full Access
Question # 40

Which of the following types of attackers would be MOST likely to use multiple zero-day exploits executed against high-value, well-defended targets for the purposes of espionage and sabotage?

A.

Cybercriminals

B.

Hacktivists

C.

State-sponsored hackers

D.

Cyberterrorist

Full Access
Go to page: