Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CFR-410 Exam Dumps - CyberSec First Responder (CFR) Exam

Go to page:
Question # 41

A network administrator has determined that network performance has degraded due to excessive use of

social media and Internet streaming services. Which of the following would be effective for limiting access to these types of services, without completely restricting access to a site?

A.

Whitelisting

B.

Web content filtering

C.

Network segmentation

D.

Blacklisting

Full Access
Question # 42

Which of the following technologies would reduce the risk of a successful SQL injection attack?

A.

Reverse proxy

B.

Web application firewall

C.

Stateful firewall

D.

Web content filtering

Full Access
Question # 43

How does encryption work to protect information on remote workers' computers?

A.

It is difficult to set up, so an unskilled attacker won't be able to figure it out.

B.

Without the proper key, an attacker won't be able to unscramble the encrypted information.

C.

Using encryption requires advanced training in mathematics, which is beyond the capabilities of most attackers.

D.

Information can be encrypted but it can never be decrypted leaving an attacker unable to read the information

Full Access
Question # 44

What is the primary role of an intrusion detection system (IDS) on a network?

A.

Blocking malicious packets

B.

Detection of possible threats

C.

Detection of network vulnerabilities

D.

Detection of system failures

Full Access
Question # 45

Which of the following enables security personnel to have the BEST security incident recovery practices?

A.

Crisis communication plan

B.

Disaster recovery plan

C.

Occupant emergency plan

D.

Incident response plan

Full Access
Question # 46

An organization recently suffered a breach due to a human resources administrator emailing employee names and Social Security numbers to a distribution list. Which of the following tools would help mitigate this risk from recurring?

A.

Data loss prevention (DLP)

B.

Firewall

C.

Web proxy

D.

File integrity monitoring

Full Access
Question # 47

Which of the following should normally be blocked through a firewall?

A.

SNMP

B.

SMTP

C.

NTP

D.

POP3

Full Access
Question # 48

The statement of applicability (SOA) document forms a fundamental part of which framework?

A.

Generally Accepted Privacy Principles (GAPP)

B.

HIPAA

C.

NIST Privacy Framework

D.

ISO/IEC 27000 series

Full Access
Go to page: