Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

CFR-210 Logical Operations CyberSec First Responder Questions and Answers

Questions 4

Which of the following describes the MOST important reason for capturing post-attack metadata?

Options:

A.

To assist in updating the Business Continuity Plan

B.

To assist in writing a security magazine article

C.

To assist in fortification of defenses to prevent future attacks

D.

To assist in improving security awareness training

Buy Now
Questions 5

Log review shows that large amounts of data are being sent to an IP address unassociated with the company. Which of the following migration techniques should be implemented?

Options:

A.

DNS filtering

B.

System hardening

C.

Proxy

D.

IPS

Buy Now
Questions 6

While a network administrator is monitoring the company network, an unknown local IP address is starting to release high volumes of anonymous traffic to an unknown external IP address. Which of the following would indicate to the network administrator potential compromise?

Options:

A.

Packet losses

B.

Excessive bandwidth usage

C.

Service disruption

D.

Off-hours usage

Buy Now
Questions 7

Which of the following describes pivoting?

Options:

A.

Copying captured data to a hacker’s system

B.

Performing IP packet inspection

C.

Generating excessive network traffic

D.

Accessing another system from a compromised system

Buy Now
Questions 8

An attacker has sent malicious macro-enabled Office files. Which of the following regular expressions will return a list of macro-enabled files?

Options:

A.

^.*?\.(?:xls|ppt|doc)m

B.

^.*(?:xls|ppt|doc)m.*

C.

^.*?\.(?:xls|ppt|doc)m$

D.

^.*(?:xls|ppt|doc)m

Buy Now
Questions 9

An alert has been triggered identifying a new application running on a Windows server. Which of the following tools can be used to identify the application? (Choose two.)

Options:

A.

traceroute

B.

nbstat

C.

Hex editor

D.

Task manager

E.

Process explorer

Buy Now
Questions 10

During review of a company’s web server logs, the following items are discovered:

2015-03-01 03:32:11 www.example.com/index.asp?id=-999 or 1=convert(int,@@version)—

2015-03-01 03:35:33 www.example.com/index.asp?id=-999 or 1=convert(int,db_name())—

2015-03-01 03:38:25 www.example.com/index.asp?id=-999 or 1=convert(int,user_name())—

Which of the following is depicted in the log example above?

Options:

A.

An administrator using the web interface for application maintenance

B.

Normal web application traffic

C.

A web application scan

D.

An attempt at enumeration via SQL injection

Buy Now
Questions 11

From a compromised system, an attacker bypasses a proxy server and sends a large amount of data to a remote location. A security analyst is tasked with finding the conduit that was used by the attacker to bypass the proxy. Which of the following Windows tools should be used to find the conduit?

Options:

A.

net

B.

fport

C.

nbstat

D.

netstat

Buy Now
Questions 12

A malicious actor sends a crafted email to the office manager using personal information collected from social media. This type of social engineering attack is known as:

Options:

A.

spear phishing

B.

vishing

C.

phishing

D.

whaling

Buy Now
Questions 13

During an investigation on Windows 10 system, a system administrator needs to analyze Windows event logs related to CD/DVD-burning activities. In which of the following paths will the system administrator find these logs?

Options:

A.

\Windows\Systems32\winevt\logs\System.evt

B.

\Windows\System32\winevt\Logs\System.evtx

C.

\Windows\Systems\winevt\Evtlogs\System.evtx

D.

\Windows\System\winevt\Logs\System.evt

Buy Now
Questions 14

During a malware outbreak, a security analyst has been asked to capture network traffic in hourly increments for analysis by the incident response team. Which of the following tcpdump commands would generate hourly pcap files?

Options:

A.

tcpdump –nn –i eth0 –w output.pcap –C 100 –W 10

B.

tcpdump –nn –i eth0 –w output.pcap –W 24

C.

tcpdump –nn –i eth0 –w output.pcap –G 3600 –W 14

D.

tcpdump –nn –i eth0 –w output.pcap

Buy Now
Questions 15

Which of the following protocols can be used for data extension?

Options:

A.

SNMP

B.

DNS

C.

ARP

D.

DHCP

Buy Now
Exam Code: CFR-210
Exam Name: Logical Operations CyberSec First Responder
Last Update: Dec 4, 2024
Questions: 100

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99