최신 CFR-310 무료덤프 - CertNexus CyberSec First Responder (CFR)
After a hacker obtained a shell on a Linux box, the hacker then sends the exfiltrated data via Domain Name System (DNS). This is an example of which type of data exfiltration?
정답: C
Which asset would be the MOST desirable for a financially motivated attacker to obtain from a health insurance company?
정답: B
A system administrator identifies unusual network traffic from outside the local network. Which of the following is the BEST method for mitigating the threat?
정답: A
Which of the following security best practices should a web developer reference when developing a new web- based application?
정답: C
While planning a vulnerability assessment on a computer network, which of the following is essential?
(Choose two.)
(Choose two.)
정답: A,C
Which of the following characteristics of a web proxy strengthens cybersecurity? (Choose two.)
정답: A,E
A company that maintains a public city infrastructure was breached and information about future city projects was leaked. After the post-incident phase of the process has been completed, which of the following would be PRIMARY focus of the incident response team?
정답: A
The incident response team has completed root cause analysis for an incident. Which of the following actions should be taken in the next phase of the incident response process? (Choose two.)
정답: A,B
A Linux system administrator found suspicious activity on host IP 192.168.10.121. This host is also establishing a connection to IP 88.143.12.123. Which of the following commands should the administrator use to capture only the traffic between the two hosts?
정답: D
Which of the following would MOST likely make a Windows workstation on a corporate network vulnerable to remote exploitation?
정답: B