Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free CertNexus CFR-410 Practice Exam with Questions & Answers | Set: 5

Questions 41

Which common source of vulnerability should be addressed to BEST mitigate against URL redirection attacks?

Options:
A.

Application

B.

Users

C.

Network infrastructure

D.

Configuration files

CertNexus CFR-410 Premium Access
Questions 42

Which of the following are components of Security Content Automation Protocol (SCAP)?

Options:
A.

CVM, NVD, and OSVDB

B.

CVE, CVSS, and OSVDB

C.

CVE, CVSS, and OVAL

D.

CWE, CWSS, and OVAL

Questions 43

Which of the following digital forensic goals is being provided with hashing and time-stamping of the electronic evidence?

Options:
A.

Confidentiality

B.

Encryption

C.

Integrity

D.

Availability

E.

Chain of custody

Questions 44

Which of the following does the command nmap –open 10.10.10.3 do?

Options:
A.

Execute a scan on a single host, returning only open ports.

B.

Execute a scan on a subnet, returning detailed information on open ports.

C.

Execute a scan on a subnet, returning all hosts with open ports.

D.

Execute a scan on a single host, returning open services.

Questions 45

Which of the following actions should be done by the incident response team after completing the recovery phase of the cyber incident caused by malware?

Options:
A.

Eradicate the malware.

B.

Conduct lessons learned.

C.

Isolate the malware from the system.

D.

Collect evidence for the lawsuit.

E.

Analyze the behavior of the malware.

Questions 46

The statement of applicability (SOA) document forms a fundamental part of which framework?

Options:
A.

Generally Accepted Privacy Principles (GAPP)

B.

HIPAA

C.

NIST Privacy Framework

D.

ISO/IEC 27000 series

Questions 47

In a Linux operating system, what kind of information does a /var/log/daemon.log file contain?

Options:
A.

Debug-related messages

B.

Various system background processes

C.

System messages

D.

User password

Questions 48

A first responder notices a file with a large amount of clipboard information stored in it. Which part of the MITRE ATT&CK matrix has the responder discovered?

Options:
A.

Collection

B.

Discovery

C.

Lateral movement

D.

Exfiltration

Questions 49

Nmap is a tool most commonly used to:

Options:
A.

Map a route for war-driving

B.

Determine who is logged onto a host

C.

Perform network and port scanning

D.

Scan web applications