Free Demo Questions

Test Online Free CertNexus CFR-410 Exam Questions and Answers

Practice a live sample before buying full access. This page keeps the free CFR-410 question set organized by page so visitors and search engines can reach the canonical -questions.html URL directly.

Updated Nov 30, 2022 20 Questions 2 Pages
Page 1 of 2
Next Page
Question 1 Selectable Answer
An incident responder discovers that the CEO logged in from their New York City office and then logged in from a location in Beijing an hour later. The incident responder suspects that the CEO’s account has been
compromised.
Which of the following anomalies MOST likely contributed to the incident responder’s suspicion?

Answer:
Explanation:
Reference: https://www.infosecurity-magazine.com/opinions/geo-velocity-adaptive/
Question 2 Selectable Answer
Which common source of vulnerability should be addressed to BEST mitigate against URL redirection attacks?

Answer:
Explanation:
Reference: https://blog.qualys.com/securitylabs/2016/01/07/open-redirection-a-simple-vulnerability-threatens- your-web-applications
Question 3 Selectable Answer
Which of the following is a cybersecurity solution for insider threats to strengthen information protection?

Answer:
Explanation:
Reference: https://www.techrepublic.com/article/how-to-protect-your-organization-against-insider-threats/
Question 4 Selectable Answer
An incident response team is concerned with verifying the integrity of security information and event management (SIEM) events after being written to disk.
Which of the following represents the BEST option for addressing this concern?

Answer:
Explanation:
Reference: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-92.pdf
Question 5 Selectable Answer
Which of the following would MOST likely make a Windows workstation on a corporate network vulnerable to remote exploitation?

Answer:
Question 6 Selectable Answer
While performing routing maintenance on a Windows Server, a technician notices several unapproved Windows Updates and that remote access software has been installed. The technician suspects that a malicious actor has gained access to the system.
Which of the following steps in the attack process does this activity indicate?

Answer:
Question 7 Selectable Answer
Which of the following, when exposed together, constitutes PII? (Choose two.)

Answer:
Explanation:
Reference: https://www.lifelock.com/learn-identity-theft-resources-what-is-personally-identifiable- information.html
Question 8 Selectable Answer
A company website was hacked via the following SQL query:
email, passwd, login_id, full_name FROM members
WHERE email = “[email protected]”; DROP TABLE members; C”
Which of the following did the hackers perform?

Answer:
Question 9 Selectable Answer
A company help desk is flooded with calls regarding systems experiencing slow performance and certain Internet sites taking a long time to load or not loading at all.
The security operations center (SOC) analysts who receive these calls take the following actions:
- Running antivirus scans on the affected user machines
- Checking department membership of affected users
- Checking the host-based intrusion prevention system (HIPS) console for affected user machine alerts
- Checking network monitoring tools for anomalous activities
Which of the following phases of the incident response process match the actions taken?

Answer:
Question 10 Selectable Answer
Which of the following are part of the hardening phase of the vulnerability assessment process? (Choose two.)

Answer:
Question 11 Selectable Answer
After imaging a disk as part of an investigation, a forensics analyst wants to hash the image using a tool that supports piecewise hashing.
Which of the following tools should the analyst use?

Answer:
Question 12 Selectable Answer
During a log review, an incident responder is attempting to process the proxy server’s log files but finds that they are too large to be opened by any file viewer.
Which of the following is the MOST appropriate technique to open and analyze these log files?

Answer:
Explanation:
Reference: https://superuser.com/QUESTION NO:s/45142/hex-editor-for-large-files-in-linux
Question 13 Selectable Answer
The Key Reinstallation Attack (KRACK) vulnerability is specific to which types of devices? (Choose two.)

Answer:
Explanation:
Reference: https://www.kaspersky.com/blog/krackattack/19798/
Question 14 Selectable Answer
A government organization responsible for critical infrastructure is being attacked and files on the server been deleted.
Which of the following are the most immediate communications that should be made regarding the incident? (Choose two.)

Answer:
Question 15 Selectable Answer
Recently, a cybersecurity research lab discovered that there is a hacking group focused on hacking into the computers of financial executives in Company A to sell the exfiltrated information to Company B.
Which of the following threat motives does this MOST likely represent?

Answer:
Showing page 1 of 2
Next Page