Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CertNexus CFR-410 Practice Exam with Questions & Answers | Set: 4

Questions 31

The Key Reinstallation Attack (KRACK) vulnerability is specific to which types of devices? (Choose two.)

Options:
A.

Wireless router

B.

Switch

C.

Firewall

D.

Access point

E.

Hub

CertNexus CFR-410 Premium Access
Questions 32

Which are successful Disaster Recovery Plan best practices options to be considered? (Choose three.)

Options:
A.

Isolate the services and data as much as possible.

B.

Back up to a NAS device that is attached 24 hours a day, 7 days a week.

C.

Understand which processes are critical to the business and have to run in disaster recovery.

D.

Maintain integrity between primary and secondary deployments.

E.

Store any data elements in the root storage that is used for root access for the workspace.

Questions 33

According to SANS, when should an incident retrospective be performed?

Options:
A.

After law enforcement has identified the perpetrators of the attack.

B.

Within six months following the end of the incident.

C.

No later than two weeks from the end of the incident.

D.

Immediately concluding eradication of the root cause

Questions 34

Where are log entries written for auditd in Linux?

Options:
A.

/etc/audit/audit.rules

B.

/var/log/audit/messages

C.

/var/log/audit/audit.log

D.

/var/log/audit.log

E.

/etc/audit/audit.conf

Questions 35

After a security breach, a security consultant is hired to perform a vulnerability assessment for a company’s web application. Which of the following tools would the consultant use?

Options:
A.

Nikto

B.

Kismet

C.

tcpdump

D.

Hydra

Questions 36

A digital forensics investigation requires analysis of a compromised system's physical memory. Which of the following tools should the forensics analyst use to complete this task?

Options:
A.

Autopsy

B.

FTK

C.

Volatility

D.

Wire shark

E.

CAINE

Questions 37

Which of the following, when exposed together, constitutes PII? (Choose two.)

Options:
A.

Full name

B.

Birth date

C.

Account balance

D.

Marital status

E.

Employment status

Questions 38

Which of the following would MOST likely make a Windows workstation on a corporate network vulnerable to remote exploitation?

Options:
A.

Disabling Windows Updates

B.

Disabling Windows Firewall

C.

Enabling Remote Registry

D.

Enabling Remote Desktop

Questions 39

To minimize vulnerability, which steps should an organization take before deploying a new Internet of Things (IoT) device? (Choose two.)

Options:
A.

Changing the default password

B.

Updating the device firmware

C.

Setting up new users

D.

Disabling IPv6

E.

Enabling the firewall

Questions 40

Which of the following security best practices should a web developer reference when developing a new web- based application?

Options:
A.

Control Objectives for Information and Related Technology (COBIT)

B.

Risk Management Framework (RMF)

C.

World Wide Web Consortium (W3C)

D.

Open Web Application Security Project (OWASP)