Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CFR-410 Exam Dumps - CyberSec First Responder (CFR) Exam

Go to page:
Question # 4

A Linux system administrator found suspicious activity on host IP 192.168.10.121. This host is also establishing a connection to IP 88.143.12.123. Which of the following commands should the administrator use to capture only the traffic between the two hosts?

A.

# tcpdump -i eth0 host 88.143.12.123

B.

# tcpdump -i eth0 dst 88.143.12.123

C.

# tcpdump -i eth0 host 192.168.10.121

D.

# tcpdump -i eth0 src 88.143.12.123

Full Access
Question # 5

A network security analyst has noticed a flood of Simple Mail Transfer Protocol (SMTP) traffic to internal clients. SMTP traffic should only be allowed to email servers. Which of the following commands would stop this attack? (Choose two.)

A.

iptables -A INPUT -p tcp –dport 25 -d x.x.x.x -j ACCEPT

B.

iptables -A INPUT -p tcp –sport 25 -d x.x.x.x -j ACCEPT

C.

iptables -A INPUT -p tcp –dport 25 -j DROP

D.

iptables -A INPUT -p tcp –destination-port 21 -j DROP

E.

iptables -A FORWARD -p tcp –dport 6881:6889 -j DROP

Full Access
Question # 6

To minimize vulnerability, which steps should an organization take before deploying a new Internet of Things (IoT) device? (Choose two.)

A.

Changing the default password

B.

Updating the device firmware

C.

Setting up new users

D.

Disabling IPv6

E.

Enabling the firewall

Full Access
Question # 7

What is the correct order of the DFIR phases?

Full Access
Question # 8

Which term describes the process of collecting logs from many sources across an IT infrastructure into a single, centralized platform to be reviewed and analyzed?

A.

Log processing

B.

Log aggregation

C.

Log monitoring

D.

Log normalization

E.

Log correlation

Full Access
Go to page: