Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CertNexus CFR-410 Practice Exam with Questions & Answers | Set: 3

Questions 21

A web server is under a denial of service (DoS) attack. The administrator reviews logs and creates an access control list (ACL) to stop the attack. Which of the following technologies could perform these steps automatically in the future?

Options:
A.

Intrusion prevention system (IPS)

B.

Intrusion detection system (IDS)

C.

Blacklisting

D.

Whitelisting

CertNexus CFR-410 Premium Access
Questions 22

Vulnerability scanners generally classify vulnerabilities by which of the following? (Choose two.)

Options:
A.

Exploit range

B.

Costs

C.

Severity level

D.

Zero days

E.

Threat modeling

Questions 23

Traditional SIEM systems provide:

Options:
A.

Unknown Attacks Analysis User Behavior Analysis and Network Anomalies

B.

Aggregation, Normalization, Correlation, and Alerting.

C.

Static Malware Analysis, Dynamic Malware Analysis, and Hybrid Malware Analysis.

D.

Privileged Identity Management. Privileged Access Management, and Identity and Access Management.

Questions 24

After a hacker obtained a shell on a Linux box, the hacker then sends the exfiltrated data via Domain Name System (DNS). This is an example of which type of data exfiltration?

Options:
A.

Covert channels

B.

File sharing services

C.

Steganography

D.

Rogue service

Questions 25

A security administrator needs to review events from different systems located worldwide. Which of the

following is MOST important to ensure that logs can be effectively correlated?

Options:
A.

Logs should be synchronized to their local time zone.

B.

Logs should be synchronized to a common, predefined time source.

C.

Logs should contain the username of the user performing the action.

D.

Logs should include the physical location of the action performed.

Questions 26

A system administrator pulls records from a database that only requires the use of their general user vs. domain admin account. Use of the general user account demonstrates which of the following concepts?

Options:
A.

Discretionary Access Control

B.

Separation of Duties

C.

Least Privilege

D.

Privileged Access Management

Questions 27

What is the definition of a security breach?

Options:
A.

An event or series of correlated events that indicate a potential violation of some control or policy.

B.

Unauthorized access that violates the authentication, authorization, and accounting of an information asset through intentional access, destruction, or manipulation of an information asset.

C.

An event or series of uncorrelated events that indicate a potential violation of some control or policy has occurred.

D.

Unauthorized access that violates the confidentiality, integrity, or availability of an information asset in the form of unintentional access, destruction, or manipulation of an information asset.

Questions 28

An incident responder was asked to analyze malicious traffic. Which of the following tools would be BEST for this?

Options:
A.

Hex editor

B.

tcpdump

C.

Wireshark

D.

Snort

Questions 29

Which of the following regulations is most applicable to a public utility provider operating in the United States?

Options:
A.

GDPR

B.

NERC

C.

FISMA

D.

HIPAA

Questions 30

A company that maintains a public city infrastructure was breached and information about future city projects was leaked. After the post-incident phase of the process has been completed, which of the following would be

PRIMARY focus of the incident response team?

Options:
A.

Restore service and eliminate the business impact.

B.

Determine effective policy changes.

C.

Inform the company board about the incident.

D.

Contact the city police for official investigation.