Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CertNexus CFR-410 Practice Exam with Questions & Answers | Set: 2

Questions 11

Which of the following is susceptible to a cache poisoning attack?

Options:
A.

Domain Name System (DNS)

B.

Secure Shell (SSH)

C.

Hypertext Transfer Protocol Secure (HTTPS)

D.

Hypertext Transfer Protocol (HTTP)

CertNexus CFR-410 Premium Access
Questions 12

What kind of measures and controls are implemented when employees get assigned personal, unique badges when they join the organization, and they remain valid until the employee's last day of work?

Options:
A.

Human resources security

B.

Communications security

C.

Physical security

D.

Operations security

Questions 13

During an audit, an organization's ability to establish key performance indicators for its service hosting solution is discovered to be weak. What could be the cause of this?

Options:
A.

Improper deployment of the Service-Oriented Architecture

B.

Insufficient Service Level Agreement (SLA)

C.

Absence of a Business Intelligence (Bl) solution

D.

Inadequate Cost Modeling (CM)

Questions 14

Which of the following is the GREATEST risk of having security information and event management (SIEM) collect computer names with older log entries?

Options:
A.

There may be duplicate computer names on the network.

B.

The computer name may not be admissible evidence in court.

C.

Domain Name System (DNS) records may have changed since the log was created.

D.

There may be field name duplication when combining log files.

Questions 15

What term means that data is valid and not corrupt?

Options:
A.

Confidentiality

B.

Authorization

C.

Integrity

D.

Authentication

Questions 16

As part of an organization’s regular maintenance activities, a security engineer visits the Internet Storm Center advisory page to obtain the latest list of blacklisted host/network addresses. The security engineer does this to perform which of the following activities?

Options:
A.

Update the latest proxy access list

B.

Monitor the organization’s network for suspicious traffic

C.

Monitor the organization’s sensitive databases

D.

Update access control list (ACL) rules for network devices

Questions 17

Which of the following attack vectors capitalizes on a previously undisclosed issue with a software application?

Options:
A.

Zero-Day Exploit

B.

Brute Force

C.

Misconfiguration

D.

Ransomware

E.

Phishing

Questions 18

A common formula used to calculate risk is:+ Threats + Vulnerabilities = Risk. Which of the following represents the missing factor in this formula?

Options:
A.

Exploits

B.

Security

C.

Asset

D.

Probability

Questions 19

Which of the following tools can help to detect suspicious or unauthorized changes to critical system configuration files?

Options:
A.

Tripwire

B.

Logstash

C.

Nessus

D.

Netcat

E.

Ifconfig

Questions 20

Which of the following are core functions of SIEM solutions?

Options:
A.

Alerts of potential attacks, forensic investigations, and incident detection.

B.

Forensic investigations, threat modeling, and big data analysis.

C.

Malware analysis, forensic investigations, and incident detection.

D.

Static malware analysis, dynamic malware analysis, and incident detection.