Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CFR-410 Exam Dumps - CyberSec First Responder (CFR) Exam

Go to page:
Question # 49

What are three benefits of security logging and monitoring? (Choos)

A.

Feeding intrusion detection systems

B.

Satisfying regulatory compliance requirements

C.

Data collection

D.

Forensic analysis and investigations

E.

Penetration testinge three.)

Full Access
Question # 50

The Key Reinstallation Attack (KRACK) vulnerability is specific to which types of devices? (Choose two.)

A.

Wireless router

B.

Switch

C.

Firewall

D.

Access point

E.

Hub

Full Access
Question # 51

An administrator believes that a system on VLAN 12 is Address Resolution Protocol (ARP) poisoning clients on the network. The administrator attaches a system to VLAN 12 and uses Wireshark to capture traffic. After

reviewing the capture file, the administrator finds no evidence of ARP poisoning. Which of the following actions should the administrator take next?

A.

Clear the ARP cache on their system.

B.

Enable port mirroring on the switch.

C.

Filter Wireshark to only show ARP traffic.

D.

Configure the network adapter to promiscuous mode.

Full Access
Question # 52

An incident at a government agency has occurred and the following actions were taken:

-Users have regained access to email accounts

-Temporary VPN services have been removed

-Host-based intrusion prevention system (HIPS) and antivirus (AV) signatures have been updated

-Temporary email servers have been decommissioned

Which of the following phases of the incident response process match the actions taken?

A.

Containment

B.

Post-incident

C.

Recovery

D.

Identification

Full Access
Question # 53

Senior management has stated that antivirus software must be installed on all employee workstations. Which

of the following does this statement BEST describe?

A.

Guideline

B.

Procedure

C.

Policy

D.

Standard

Full Access
Question # 54

Which of the following can be used as a vulnerability management and assessment tool?

A.

Nessus

B.

THC Hydra

C.

Cain & Abel

D.

John the Ripper

Full Access
Go to page: