Special Summer Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CertNexus > CyberSec First Responder > CFR-410

CFR-410 CyberSec First Responder (CFR) Exam Question and Answers

Question # 4

Which of the following digital forensic goals is being provided with hashing and time-stamping of the electronic evidence?

A.

Confidentiality

B.

Encryption

C.

Integrity

D.

Availability

E.

Chain of custody

Full Access
Question # 5

A network administrator has determined that network performance has degraded due to excessive use of

social media and Internet streaming services. Which of the following would be effective for limiting access to these types of services, without completely restricting access to a site?

A.

Whitelisting

B.

Web content filtering

C.

Network segmentation

D.

Blacklisting

Full Access
Question # 6

Where are log entries written for auditd in Linux?

A.

/etc/audit/audit.rules

B.

/var/log/audit/messages

C.

/var/log/audit/audit.log

D.

/var/log/audit.log

E.

/etc/audit/audit.conf

Full Access
Question # 7

An incident responder discovers that the CEO logged in from their New York City office and then logged in from a location in Beijing an hour later. The incident responder suspects that the CEO’s account has been

compromised. Which of the following anomalies MOST likely contributed to the incident responder’s suspicion?

A.

Geolocation

B.

False positive

C.

Geovelocity

D.

Advanced persistent threat (APT) activity

Full Access
Question # 8

Which of the following is considered a weakness or gap in a security program that can be exploited to gain unauthorized access?

A.

Risk

B.

Threat

C.

Asset

D.

Vulnerability

Full Access
Question # 9

When reviewing log files from a recent incident, the response team discovers that most of the network-based indicators are IP-based. It would be helpful to the response team if they could resolve those IP-based indicators to hostnames. Which of the following is BEST suited for this task?

A.

DNS

B.

RIP

C.

WINS

D.

NTP

E.

NFS

Full Access
Question # 10

Which of the following enables security personnel to have the BEST security incident recovery practices?

A.

Crisis communication plan

B.

Disaster recovery plan

C.

Occupant emergency plan

D.

Incident response plan

Full Access
Question # 11

Which answer option is a tactic of social engineering in which an attacker engages in an attack performed by phone?

A.

Smishing

B.

Pretexting

C.

Vishing

D.

Phishing

Full Access
Question # 12

What is the BEST process to identify the vendors that will ensure protection and compliance with security and privacy laws?

A.

Vulnerability assessment

B.

Risk assessment

C.

Penetration testing

D.

Security and privacy review

Full Access
Question # 13

Which are successful Disaster Recovery Plan best practices options to be considered? (Choose three.)

A.

Isolate the services and data as much as possible.

B.

Back up to a NAS device that is attached 24 hours a day, 7 days a week.

C.

Understand which processes are critical to the business and have to run in disaster recovery.

D.

Maintain integrity between primary and secondary deployments.

E.

Store any data elements in the root storage that is used for root access for the workspace.

Full Access
Question # 14

A Windows system administrator has received notification from a security analyst regarding new malware that executes under the process name of “armageddon.exe” along with a request to audit all department workstations for its presence. In the absence of GUI-based tools, what command could the administrator execute to complete this task?

A.

ps -ef | grep armageddon

B.

top | grep armageddon

C.

wmic process list brief | find “armageddon.exe”

D.

wmic startup list full | find “armageddon.exe”

Full Access
Question # 15

Which of the following are common areas of vulnerabilities in a network switch? (Choose two.)

A.

Default port state

B.

Default credentials

C.

Default protocols

D.

Default encryption

E.

Default IP address

Full Access
Question # 16

What are three examples of incident response? (Choose three.)

A.

Dealing with systems that are suspected to be used to commit a crime

B.

Collecting data from computer media

C.

Dealing with systems suspected to be the victim of a crime

D.

Analyzing a system

E.

Threat Modeling

Full Access
Question # 17

Traditional SIEM systems provide:

A.

Unknown Attacks Analysis User Behavior Analysis and Network Anomalies

B.

Aggregation, Normalization, Correlation, and Alerting.

C.

Static Malware Analysis, Dynamic Malware Analysis, and Hybrid Malware Analysis.

D.

Privileged Identity Management. Privileged Access Management, and Identity and Access Management.

Full Access
Question # 18

Which standard was implemented in the United States to protect the privacy of patient medical information through restricted access to medical records and regulations for sharing medical records?

A.

NIST

B.

GLBA

C.

SOX

D.

HIPAA

Full Access
Question # 19

A security analyst needs to capture network traffic from a compromised Mac host. They attempt to execute the tcpdump command using their general user account but continually receive an "Operation Not Permitted" error.

Use of which of the following commands will allow the analyst to capture traffic using tcpdump successfully?

A.

sudo

B.

netstat

C.

chroot

D.

chmod

E.

lsof

Full Access
Question # 20

A user receives an email about an unfamiliar bank transaction, which includes a link. When clicked, the link redirects the user to a web page that looks exactly like their bank’s website and asks them to log in with their username and password. Which type of attack is this?

A.

Whaling

B.

Smishing

C.

Vishing

D.

Phishing

Full Access
Question # 21

In a Linux operating system, what kind of information does a /var/log/daemon.log file contain?

A.

Debug-related messages

B.

Various system background processes

C.

System messages

D.

User password

Full Access
Question # 22

An attacker intercepts a hash and compares it to pre-computed hashes to crack a password. Which of the following methods has been used?

A.

Password sniffing

B.

Brute force attack

C.

Rainbow tables

D.

Dictionary attack

Full Access
Question # 23

It was recently discovered that many of an organization’s servers were running unauthorized cryptocurrency mining software. Which of the following assets were being targeted in this attack? (Choose two.)

A.

Power resources

B.

Network resources

C.

Disk resources

D.

Computing resources

E.

Financial resources

Full Access
Question # 24

Which two answer options correctly highlight the difference between static and dynamic binary analysis techniques? (Choose two.)

A.

Dynamic analysis tells everything the program can do. and static analysis tells exactly what the program does when it is executed in a given environment and with a particular input.

B.

Static analysis tells everything the program can do. and dynamic analysis tells exactly what the program does when it is executed in a given environment and with a particular input.

C.

Dynamic analysis examines the binary without executing it, while static analysis executes the program and observes its behavior.

D.

Static analysis examines the binary without executing it. while dynamic analysis executes the program and observes its behavior.

Full Access
Question # 25

A secretary receives an email from a friend with a picture of a kitten in it. The secretary forwards it to the

~COMPANYWIDE mailing list and, shortly thereafter, users across the company receive the following message:

“You seem tense. Take a deep breath and relax!”

The incident response team is activated and opens the picture in a virtual machine to test it. After a short analysis, the following code is found in C:

\Temp\chill.exe:Powershell.exe –Command “do {(for /L %i in (2,1,254) do shutdown /r /m Error! Hyperlink reference not valid.> /f /t / 0 (/c “You seem tense. Take a deep breath and relax!”);Start-Sleep –s 900) } while(1)”

Which of the following BEST represents what the attacker was trying to accomplish?

A.

Taunt the user and then trigger a shutdown every 15 minutes.

B.

Taunt the user and then trigger a reboot every 15 minutes.

C.

Taunt the user and then trigger a shutdown every 900 minutes.

D.

Taunt the user and then trigger a reboot every 900 minutes.

Full Access
Question # 26

Which of the following are legally compliant forensics applications that will detect an alternative data stream (ADS) or a file with an incorrect file extension? (Choose two.)

A.

Disk duplicator

B.

EnCase

C.

dd

D.

Forensic Toolkit (FTK)

E.

Write blocker

Full Access
Question # 27

Tcpdump is a tool that can be used to detect which of the following indicators of compromise?

A.

Unusual network traffic

B.

Unknown open ports

C.

Poor network performance

D.

Unknown use of protocols

Full Access
Question # 28

A computer forensics analyst suspects that some of the pictures recovered from the suspect's hard drive may contain metadata pertinent to the criminal investigation. Which of the following tools is BEST suited to retrieving any available metadata?

A.

Redline

B.

ExifTool

C.

Xplico

D.

Autopsy

E.

Encase

Full Access
Question # 29

What is the correct order of the DFIR phases?

Full Access
Question # 30

A system administrator identifies unusual network traffic from outside the local network. Which of the following

is the BEST method for mitigating the threat?

A.

Malware scanning

B.

Port blocking

C.

Packet capturing

D.

Content filtering

Full Access
Question # 31

According to company policy, all accounts with administrator privileges should have suffix _ja. While reviewing Windows workstation configurations, a security administrator discovers an account without the suffix in the administrator’s group. Which of the following actions should the security administrator take?

A.

Review the system log on the affected workstation.

B.

Review the security log on a domain controller.

C.

Review the system log on a domain controller.

D.

Review the security log on the affected workstation.

Full Access
Question # 32

Network infrastructure has been scanned and the identified issues have been remediated. What is the next step in the vulnerability assessment process?

A.

Generating reports

B.

Establishing scope

C.

Conducting an audit

D.

Assessing exposures

Full Access
Question # 33

A web server is under a denial of service (DoS) attack. The administrator reviews logs and creates an access control list (ACL) to stop the attack. Which of the following technologies could perform these steps automatically in the future?

A.

Intrusion prevention system (IPS)

B.

Intrusion detection system (IDS)

C.

Blacklisting

D.

Whitelisting

Full Access
Question # 34

What describes the BEST approach for developing a plan to continuously assess and track vulnerabilities on all organizational assets and infrastructure in order to remediate and minimize the opportunity for attacks?

A.

Establish and maintain a risk-based remediation strategy.

B.

Establish and maintain detailed enterprise asset inventory.

C.

Establish and maintain a data classification scheme.

D.

Establish and maintain a data management process.

Full Access
Question # 35

Which of the following would MOST likely make a Windows workstation on a corporate network vulnerable to remote exploitation?

A.

Disabling Windows Updates

B.

Disabling Windows Firewall

C.

Enabling Remote Registry

D.

Enabling Remote Desktop

Full Access
Question # 36

Which of the following regulations is most applicable to a public utility provider operating in the United States?

A.

GDPR

B.

NERC

C.

FISMA

D.

HIPAA

Full Access
Question # 37

Which of the following backup strategies will result in the shortest backup time during weekdays and use the least amount of storage space but incur the longest restore time?

A.

Full weekly backup with daily differential backups.

B.

Mirror backups on a daily basis.

C.

Full backups on a daily basis.

D.

Full weekly backup with daily incremental backups.

Full Access
Question # 38

Which of the following types of attackers would be MOST likely to use multiple zero-day exploits executed against high-value, well-defended targets for the purposes of espionage and sabotage?

A.

Cybercriminals

B.

Hacktivists

C.

State-sponsored hackers

D.

Cyberterrorist

Full Access
Question # 39

To minimize vulnerability, which steps should an organization take before deploying a new Internet of Things (IoT) device? (Choose two.)

A.

Changing the default password

B.

Updating the device firmware

C.

Setting up new users

D.

Disabling IPv6

E.

Enabling the firewall

Full Access
Question # 40

What are the two most appropriate binary analysis techniques to use in digital forensics analysis? (Choose two.)

A.

Injection Analysis

B.

Forensic Analysis

C.

Static Analysis

D.

Dynamic Analysis

Full Access
Question # 41

The Key Reinstallation Attack (KRACK) vulnerability is specific to which types of devices? (Choose two.)

A.

Wireless router

B.

Switch

C.

Firewall

D.

Access point

E.

Hub

Full Access
Question # 42

As part of an organization’s regular maintenance activities, a security engineer visits the Internet Storm Center advisory page to obtain the latest list of blacklisted host/network addresses. The security engineer does this to perform which of the following activities?

A.

Update the latest proxy access list

B.

Monitor the organization’s network for suspicious traffic

C.

Monitor the organization’s sensitive databases

D.

Update access control list (ACL) rules for network devices

Full Access
Question # 43

While reviewing some audit logs, an analyst has identified consistent modifications to the sshd_config file for an organization’s server. The analyst would like to investigate and compare contents of the current file with

archived versions of files that are saved weekly. Which of the following tools will be MOST effective during the investigation?

A.

cat * | cut –d ‘,’ –f 2,5,7

B.

more * | grep

C.

diff

D.

sort *

Full Access
Question # 44

An organization that recently suffered a ransomware attack found that its backups were faulty. Which of the following steps could BEST ensure reliable backups in the future?

A.

Storing backups at an offsite location.

B.

Implementing periodic tests of backups.

C.

Backing up all data to solid-state storage.

D.

Conducting a full asset inventory assessment.

Full Access
Question # 45

What is baseline security?

A.

A measurement used when a system changes from its original baseline.

B.

An organization's insecure starting point before fixing any security issues.

C.

An organization's secure starting point after fixing any security issues.

D.

A document stipulating constraints and practices that a user must agree to for access to an organization's network.

Full Access
Question # 46

An employee discovered the default credentials in DB servers, which were found by using a word list of commonly used and default passwords in Hydra, the tool behind the Brute functionality. The use of the word list in Hydra is an example of what type of password cracking?

A.

Rainbow tables

B.

hashcat

C.

Markov chains

D.

Brute-force

E.

Dictionary attack

Full Access
Question # 47

A company has noticed a trend of attackers gaining access to corporate mailboxes. Which of the following

would be the BEST action to take to plan for this kind of attack in the future?

A.

Scanning email server for vulnerabilities

B.

Conducting security awareness training

C.

Hardening the Microsoft Exchange Server

D.

Auditing account password complexity

Full Access
Question # 48

During which of the following attack phases might a request sent to port 1433 over a whole company network be seen within a log?

A.

Reconnaissance

B.

Scanning

C.

Gaining access

D.

Persistence

Full Access
Question # 49

After a security breach, a security consultant is hired to perform a vulnerability assessment for a company’s web application. Which of the following tools would the consultant use?

A.

Nikto

B.

Kismet

C.

tcpdump

D.

Hydra

Full Access
Question # 50

When tracing an attack to the point of origin, which of the following items is critical data to map layer 2 switching?

A.

DNS cache

B.

ARP cache

C.

CAM table

D.

NAT table

Full Access
Question # 51

Which of the following could be useful to an organization that wants to test its incident response procedures without risking any system downtime?

A.

Blue team exercise

B.

Business continuity exercise

C.

Tabletop exercise

D.

Red team exercise

Full Access
Question # 52

An incident responder has collected network capture logs in a text file, separated by five or more data fields.

Which of the following is the BEST command to use if the responder would like to print the file (to terminal/ screen) in numerical order?

A.

cat | tac

B.

more

C.

sort –n

D.

less

Full Access
Question # 53

Which of the following is an automated password cracking technique that uses a combination of uppercase and lowercase letters, 0-9 numbers, and special characters?

A.

Dictionary attack

B.

Password guessing

C.

Brute force attack

D.

Rainbow tables

Full Access
Question # 54

During an audit, an organization's ability to establish key performance indicators for its service hosting solution is discovered to be weak. What could be the cause of this?

A.

Improper deployment of the Service-Oriented Architecture

B.

Insufficient Service Level Agreement (SLA)

C.

Absence of a Business Intelligence (Bl) solution

D.

Inadequate Cost Modeling (CM)

Full Access