1 / 8

Get Confirmed Success With CertNexus CFR Certificed CFR-310 Practice Test V8.02 Killtest

It is highly recommended to choose CertNexus CFR Certificed CFR-310 Practice Test V8.02 Killtest to prepare for CFR-310 CyberSec First Responder Exam. The actual CFR-310 exam questions and answers of Killtest CFR-310 practice exam are well organized and formatted in PDF file and testing engine. Killtest experts and industry professionals have burnt their midnight oil to ink these up to date and advanced CFR-310 practice exam questions to help students to be fully equipped with valid CertNexus certification CFR-310 exam questions.

Download Presentation

Get Confirmed Success With CertNexus CFR Certificed CFR-310 Practice Test V8.02 Killtest

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The safer , easier way to help you pass any IT exams. 1.A network security analyst has noticed a flood of Simple Mail Transfer Protocol (SMTP) traffic to internal clients. SMTP traffic should only be allowed to email servers. Which of the following commands would stop this attack? (Choose two.) A. iptables -A INPUT -p tcp –dport 25 -d x.x.x.x -j ACCEPT B. iptables -A INPUT -p tcp –sport 25 -d x.x.x.x -j ACCEPT C. iptables -A INPUT -p tcp –dport 25 -j DROP D. iptables -A INPUT -p tcp –destination-port 21 -j DROP E. iptables -A FORWARD -p tcp –dport 6881:6889 -j DROP Answer: AC 2.A secretary receives an email from a friend with a picture of a kitten in it. The secretary forwards it to the ~COMPANYWIDE mailing list and, shortly thereafter, users across the company receive the following message: “You seem tense. Take a deep breath and relax!” The incident response team is activated and opens the picture in a virtual machine to test it. After a short analysis, the following code is found in C: \Temp\chill.exe:Powershell.exe –Command “do {(for /L %i in (2,1,254) do shutdown /r /m Error! Hyperlink reference not valid.> /f /t / 0 (/c “You seem tense. Take a deep breath and relax!”);Start-Sleep –s 900) } while(1)” Which of the following BEST represents what the attacker was trying to accomplish? A. Taunt the user and then trigger a shutdown every 15 minutes. B. Taunt the user and then trigger a reboot every 15 minutes. C. Taunt the user and then trigger a shutdown every 900 minutes. D. Taunt the user and then trigger a reboot every 900 minutes. Answer: B 3.A Linux system administrator found suspicious activity on host IP 192.168.10.121. This host is also establishing a connection to IP 88.143.12.123. Which of the following commands should the administrator use to capture only the traffic between the two hosts? A. # tcpdump -i eth0 host 88.143.12.123 B. # tcpdump -i eth0 dst 88.143.12.123 C. # tcpdump -i eth0 host 192.168.10.121 CertNexus CFR Certificed CFR-310 Practice Test V8.02 Killtest D. # tcpdump -i eth0 src 88.143.12.123 Answer: B 4.After imaging a disk as part of an investigation, a forensics analyst wants to hash the image using a tool that supports piecewise hashing. Which of the following tools should the analyst use? A. md5sum B. sha256sum C. md5deep D. hashdeep Answer: A 2 / 7

  2. The safer , easier way to help you pass any IT exams. 5.Which of the following is a cybersecurity solution for insider threats to strengthen information protection? A. Web proxy B. Data loss prevention (DLP) C. Anti-malware D. Intrusion detection system (IDS) Answer: B Explanation: Reference: https://www.techrepublic.com/article/how-to-protect-your-organization-against-insider-threats/ 6.A security administrator is investigating a compromised host. Which of the following commands could the investigator use to display executing processes in real time? A. ps B. top C. nice D. pstree Answer: B Explanation: Reference: https://www.cyberciti.biz/faq/show-all-running-processes-in-linux/ 7.A system administrator identifies unusual network traffic from outside the local network. Which of the following is the BEST method for mitigating the threat? A. Malware scanning B. Port blocking C. Packet capturing D. Content filtering Answer: C 8.Which of the following technologies would reduce the risk of a successful SQL injection attack? A. Reverse proxy B. Web application firewall C. Stateful firewall CertNexus CFR Certificed CFR-310 Practice Test V8.02 Killtest D. Web content filtering Answer: B Explanation: Reference: http://www.enterprisenetworkingplanet.com/netsecur/article.php/3866756/10-Ways-to-Prevent-or- Mitigate-SQL-Injection-Attacks.htm 9.An incident responder has collected network capture logs in a text file, separated by five or more data fields. Which of the following is the BEST command to use if the responder would like to print the file (to terminal/ screen) in numerical order? 3 / 7

  3. The safer , easier way to help you pass any IT exams. A. cat | tac B. more C. sort –n D. less Answer: C Explanation: Reference: https://kb.iu.edu/d/afjb 10.Which of the following characteristics of a web proxy strengthens cybersecurity? (Choose two.) A. Increases browsing speed B. Filters unwanted content C. Limits direct connection to Internet D. Caches frequently-visited websites E. Decreases wide area network (WAN) traffic Answer: AD 11.A cybersecurity expert assigned to be the IT manager of a middle-sized company discovers that there is little endpoint security implementation on the company’s systems. Which of the following could be included in an endpoint security solution? (Choose two.) A. Web proxy B. Network monitoring system C. Data loss prevention (DLP) D. Anti-malware E. Network Address Translation (NAT) Answer: AB 12.During a security investigation, a suspicious Linux laptop is found in the server room. The laptop is processing information and indicating network activity. The investigator is preparing to launch an investigation to determine what is happening with this laptop. Which of the following is the MOST appropriate set of Linux commands that should be executed to conduct the investigation? A. iperf, traceroute, whois, ls, chown, cat B. iperf, wget, traceroute, dc3dd, ls, whois CertNexus CFR Certificed CFR-310 Practice Test V8.02 Killtest C. lsof, chmod, nano, whois, chown, ls D. lsof, ifconfig, who, ps, ls, tcpdump Answer: B 13.A security analyst is required to collect detailed network traffic on a virtual machine. Which of the following tools could the analyst use? A. nbtstat B. WinDump C. fport D. netstat Answer: D 4 / 7

  4. The safer , easier way to help you pass any IT exams. 14.After a security breach, a security consultant is hired to perform a vulnerability assessment for a company’s web application. Which of the following tools would the consultant use? A. Nikto B. Kismet C. tcpdump D. Hydra Answer: A Explanation: Reference: https://www.scnsoft.com/blog/network-vulnerability-assessment-guide 15.When performing an investigation, a security analyst needs to extract information from text files in a Windows operating system. Which of the following commands should the security analyst use? A. findstr B. grep C. awk D. sigverif Answer: C Explanation: Reference: https://books.google.com.pk/books?id=8qTxCAAAQBAJ&pg=PA6&lpg=PA6&dq=awk+extract +information+from+text+files+in+a+Windows+operating+system&source=bl&ots=mm7bH69viV&sig=ACf U3U2sg2lNmZXZW0FKQWctyfH89yAz3Q&hl=en&sa=X&ved=2ahUKEwiFioWCgbbpAhVFQBoKHavGA cUQ6AEwAHoECBQQAQ#v=onepage&q=awk%20extract%20information%20from%20text%20files%20i n%20a%20Windows%20operating%20system&f=false 16.Which of the following does the command nmap –open 10.10.10.3 do? A. Execute a scan on a single host, returning only open ports. B. Execute a scan on a subnet, returning detailed information on open ports. C. Execute a scan on a subnet, returning all hosts with open ports. D. Execute a scan on a single host, returning open services. Answer: D CertNexus CFR Certificed CFR-310 Practice Test V8.02 Killtest 17.A web server is under a denial of service (DoS) attack. The administrator reviews logs and creates an access control list (ACL) to stop the attack. Which of the following technologies could perform these steps automatically in the future? A. Intrusion prevention system (IPS) B. Intrusion detection system (IDS) C. Blacklisting D. Whitelisting Answer: B Explanation: Reference: https://www.ciscopress.com/articles/article.asp?p=345618 5 / 7

  5. The safer , easier way to help you pass any IT exams. 18.An organization recently suffered a breach due to a human resources administrator emailing employee names and Social Security numbers to a distribution list. Which of the following tools would help mitigate this risk from recurring? A. Data loss prevention (DLP) B. Firewall C. Web proxy D. File integrity monitoring Answer: A 19.An incident responder was asked to analyze malicious traffic. Which of the following tools would be BEST for this? A. Hex editor B. tcpdump C. Wireshark D. Snort Answer: C Explanation: Reference: https://resources.infosecinstitute.com/category/certifications-training/network-traffic-analysis-for- incident-response/threat-intelligence-collection-and-analysis/analyzing-fileless-malware/#gref 20.A network administrator has determined that network performance has degraded due to excessive use of social media and Internet streaming services. Which of the following would be effective for limiting access to these types of services, without completely restricting access to a site? A. Whitelisting B. Web content filtering C. Network segmentation D. Blacklisting Answer: B Explanation: Reference: https://umbrella.cisco.com/solutions/web-content-filtering CertNexus CFR Certificed CFR-310 Practice Test V8.02 Killtest 21.An administrator believes that a system on VLAN 12 is Address Resolution Protocol (ARP) poisoning clients on the network. The administrator attaches a system to VLAN 12 and uses Wireshark to capture traffic. After reviewing the capture file, the administrator finds no evidence of ARP poisoning. Which of the following actions should the administrator take next? A. Clear the ARP cache on their system. B. Enable port mirroring on the switch. C. Filter Wireshark to only show ARP traffic. D. Configure the network adapter to promiscuous mode. Answer: D Explanation: 6 / 7

  6. The safer , easier way to help you pass any IT exams. Reference: https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_arp_poisoning.htm 22.A security investigator has detected an unauthorized insider reviewing files containing company secrets. Which of the following commands could the investigator use to determine which files have been opened by this user? A. ls B. lsof C. ps D. netstat Answer: B Explanation: Reference: https://books.google.com.pk/books?id=sxr50IxP27AC&pg=PA49&lpg=PA49&dq=linux+commands+could +the+investigator+use+to+determine+which+files+have+been+opened+by+this+user&source=bl&ots=R UG5bOAhGE&sig=ACfU3U3qv3h4lGh1GQP6mdNLy1RZH- SPDg&hl=en&sa=X&ved=2ahUKEwiNpPeambbpAhVmx4UKHVt5CeIQ6AEwAHoECBMQAQ#v=onepag e&q=linux%20commands%20could%20the%20investigator%20use%20to%20determine%20which%20fil es% 20have%20been%20opened%20by%20this%20user&f=false 23.While performing routing maintenance on a Windows Server, a technician notices several unapproved Windows Updates and that remote access software has been installed. The technician suspects that a malicious actor has gained access to the system. Which of the following steps in the attack process does this activity indicate? A. Expanding access B. Covering tracks C. Scanning D. Persistence Answer: A 24.Which of the following types of attackers would be MOST likely to use multiple zero-day exploits executed against high-value, well-defended targets for the purposes of espionage and sabotage? A. Cybercriminals CertNexus CFR Certificed CFR-310 Practice Test V8.02 Killtest B. Hacktivists C. State-sponsored hackers D. Cyberterrorist Answer: C 7 / 7

More Related