Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CertNexus CFR-410 Practice Exam with Questions & Answers

Questions 1

Which of the following is a method of reconnaissance in which a ping is sent to a target with the expectation of receiving a response?

Options:
A.

Active scanning

B.

Passive scanning

C.

Network enumeration

D.

Application enumeration

CertNexus CFR-410 Premium Access
Questions 2

Which encryption technology was built into Mac OS X?

Options:
A.

VeraCrypt

B.

FileVault

C.

LUKS

D.

Bitlocker

Questions 3

After imaging a disk as part of an investigation, a forensics analyst wants to hash the image using a tool that supports piecewise hashing. Which of the following tools should the analyst use?

Options:
A.

md5sum

B.

sha256sum

C.

md5deep

D.

hashdeep

Questions 4

Which of the following methods are used by attackers to find new ransomware victims? (Choose two.)

Options:
A.

Web crawling

B.

Distributed denial of service (DDoS) attack

C.

Password guessing

D.

Phishing

E.

Brute force attack

Questions 5

A security administrator notices a process running on their local workstation called SvrsScEsdKexzCv.exe.

The unknown process is MOST likely:

Options:
A.

Malware

B.

A port scanner

C.

A system process

D.

An application process

Questions 6

While performing routing maintenance on a Windows Server, a technician notices several unapproved Windows Updates and that remote access software has been installed. The technician suspects that a malicious actor has gained access to the system. Which of the following steps in the attack process does this activity indicate?

Options:
A.

Expanding access

B.

Covering tracks

C.

Scanning

D.

Persistence

Questions 7

A company has noticed a trend of attackers gaining access to corporate mailboxes. Which of the following

would be the BEST action to take to plan for this kind of attack in the future?

Options:
A.

Scanning email server for vulnerabilities

B.

Conducting security awareness training

C.

Hardening the Microsoft Exchange Server

D.

Auditing account password complexity

Questions 8

During which phase of the incident response process should an organization develop policies and procedures for incident handling?

Options:
A.

Containment

B.

Preparation

C.

Identification

D.

Recovery

Questions 9

During a malware-driven distributed denial of service attack, a security researcher found excessive requests to a name server referring to the same domain name and host name encoded in hexadecimal. The malware author used which type of command and control?

Options:
A.

Internet Relay Chat (IRC)

B.

Dnscat2

C.

Custom channel

D.

File Transfer Protocol (FTP)

Questions 10

A network security analyst has noticed a flood of Simple Mail Transfer Protocol (SMTP) traffic to internal clients. SMTP traffic should only be allowed to email servers. Which of the following commands would stop this attack? (Choose two.)

Options:
A.

iptables -A INPUT -p tcp –dport 25 -d x.x.x.x -j ACCEPT

B.

iptables -A INPUT -p tcp –sport 25 -d x.x.x.x -j ACCEPT

C.

iptables -A INPUT -p tcp –dport 25 -j DROP

D.

iptables -A INPUT -p tcp –destination-port 21 -j DROP

E.

iptables -A FORWARD -p tcp –dport 6881:6889 -j DROP