Easter Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CFR-410 Questions and Answers

Question # 6

Which of the following are well-known methods that are used to protect evidence during the forensics process? (Choose three.)

A.

Evidence bags

B.

Lock box

C.

Caution tape

D.

Security envelope

E.

Secure rooms

F.

Faraday boxes

Full Access
Question # 7

A security administrator needs to review events from different systems located worldwide. Which of the

following is MOST important to ensure that logs can be effectively correlated?

A.

Logs should be synchronized to their local time zone.

B.

Logs should be synchronized to a common, predefined time source.

C.

Logs should contain the username of the user performing the action.

D.

Logs should include the physical location of the action performed.

Full Access
Question # 8

A security operations center (SOC) analyst observed an unusually high number of login failures on a particular database server. The analyst wants to gather supporting evidence before escalating the observation to management. Which of the following expressions will provide login failure data for 11/24/2015?

A.

grep 20151124 security_log | grep –c “login failure”

B.

grep 20150124 security_log | grep “login_failure”

C.

grep 20151124 security_log | grep “login”

D.

grep 20151124 security_log | grep –c “login”

Full Access
Question # 9

What is the correct order of the DFIR phases?

Full Access
Question # 10

A company help desk is flooded with calls regarding systems experiencing slow performance and certain Internet sites taking a long time to load or not loading at all. The security operations center (SOC) analysts who receive these calls take the following actions:

-Running antivirus scans on the affected user machines

-Checking department membership of affected users

-Checking the host-based intrusion prevention system (HIPS) console for affected user machine alerts

-Checking network monitoring tools for anomalous activities

Which of the following phases of the incident response process match the actions taken?

A.

Identification

B.

Preparation

C.

Recovery

D.

Containment

Full Access
Question # 11

An employee discovered the default credentials in DB servers, which were found by using a word list of commonly used and default passwords in Hydra, the tool behind the Brute functionality. The use of the word list in Hydra is an example of what type of password cracking?

A.

Rainbow tables

B.

hashcat

C.

Markov chains

D.

Brute-force

E.

Dictionary attack

Full Access
Question # 12

While planning a vulnerability assessment on a computer network, which of the following is essential? (Choose two.)

A.

Identifying exposures

B.

Identifying critical assets

C.

Establishing scope

D.

Running scanning tools

E.

Installing antivirus software

Full Access
Question # 13

In which of the following attack phases would an attacker use Shodan?

A.

Scanning

B.

Reconnaissance

C.

Gaining access

D.

Persistence

Full Access
Question # 14

Where are log entries written for auditd in Linux?

A.

/etc/audit/audit.rules

B.

/var/log/audit/messages

C.

/var/log/audit/audit.log

D.

/var/log/audit.log

E.

/etc/audit/audit.conf

Full Access
Question # 15

According to company policy, all accounts with administrator privileges should have suffix _ja. While reviewing Windows workstation configurations, a security administrator discovers an account without the suffix in the administrator’s group. Which of the following actions should the security administrator take?

A.

Review the system log on the affected workstation.

B.

Review the security log on a domain controller.

C.

Review the system log on a domain controller.

D.

Review the security log on the affected workstation.

Full Access
Question # 16

An incident responder has collected network capture logs in a text file, separated by five or more data fields.

Which of the following is the BEST command to use if the responder would like to print the file (to terminal/ screen) in numerical order?

A.

cat | tac

B.

more

C.

sort –n

D.

less

Full Access
Question # 17

A security investigator has detected an unauthorized insider reviewing files containing company secrets.

Which of the following commands could the investigator use to determine which files have been opened by this user?

A.

ls

B.

lsof

C.

ps

D.

netstat

Full Access
Question # 18

Windows Server 2016 log files can be found in which of the following locations?

A.

C:\Windows\System\winevt\Logs

B.

C:\Windows\winevt\System32\Logs

C.

C:\Windows\System32\winevt\Logs

D.

C:\Windows\winevt\System\Logs

Full Access
Question # 19

Which of the following could be useful to an organization that wants to test its incident response procedures without risking any system downtime?

A.

Blue team exercise

B.

Business continuity exercise

C.

Tabletop exercise

D.

Red team exercise

Full Access
Question # 20

A security professional discovers a new ransomware strain that disables antivirus on the endpoint during an

infection. Which location would be the BEST place for the security professional to find technical information about this malware?

A.

Threat intelligence feeds

B.

Computer emergency response team (CERT) press releases

C.

Vulnerability databases

D.

Social network sites

Full Access
Question # 21

Which of the following types of attackers would be MOST likely to use multiple zero-day exploits executed against high-value, well-defended targets for the purposes of espionage and sabotage?

A.

Cybercriminals

B.

Hacktivists

C.

State-sponsored hackers

D.

Cyberterrorist

Full Access
Question # 22

A network administrator has determined that network performance has degraded due to excessive use of

social media and Internet streaming services. Which of the following would be effective for limiting access to these types of services, without completely restricting access to a site?

A.

Whitelisting

B.

Web content filtering

C.

Network segmentation

D.

Blacklisting

Full Access
Question # 23

An incident responder discovers that the CEO logged in from their New York City office and then logged in from a location in Beijing an hour later. The incident responder suspects that the CEO’s account has been

compromised. Which of the following anomalies MOST likely contributed to the incident responder’s suspicion?

A.

Geolocation

B.

False positive

C.

Geovelocity

D.

Advanced persistent threat (APT) activity

Full Access
Question # 24

Which of the following tools can be used as an intrusion detection system (IDS)? (Choose three.)

A.

Bro

B.

Wireshark/tshark

C.

Metasploit

D.

Suricata

E.

Snort

Full Access
Question # 25

Which of the following are components of Security Content Automation Protocol (SCAP)?

A.

CVM, NVD, and OSVDB

B.

CVE, CVSS, and OSVDB

C.

CVE, CVSS, and OVAL

D.

CWE, CWSS, and OVAL

Full Access
Question # 26

A secretary receives an email from a friend with a picture of a kitten in it. The secretary forwards it to the

~COMPANYWIDE mailing list and, shortly thereafter, users across the company receive the following message:

“You seem tense. Take a deep breath and relax!”

The incident response team is activated and opens the picture in a virtual machine to test it. After a short analysis, the following code is found in C:

\Temp\chill.exe:Powershell.exe –Command “do {(for /L %i in (2,1,254) do shutdown /r /m Error! Hyperlink reference not valid.> /f /t / 0 (/c “You seem tense. Take a deep breath and relax!”);Start-Sleep –s 900) } while(1)”

Which of the following BEST represents what the attacker was trying to accomplish?

A.

Taunt the user and then trigger a shutdown every 15 minutes.

B.

Taunt the user and then trigger a reboot every 15 minutes.

C.

Taunt the user and then trigger a shutdown every 900 minutes.

D.

Taunt the user and then trigger a reboot every 900 minutes.

Full Access
Question # 27

An administrator believes that a system on VLAN 12 is Address Resolution Protocol (ARP) poisoning clients on the network. The administrator attaches a system to VLAN 12 and uses Wireshark to capture traffic. After

reviewing the capture file, the administrator finds no evidence of ARP poisoning. Which of the following actions should the administrator take next?

A.

Clear the ARP cache on their system.

B.

Enable port mirroring on the switch.

C.

Filter Wireshark to only show ARP traffic.

D.

Configure the network adapter to promiscuous mode.

Full Access
Question # 28

A Linux administrator is trying to determine the character count on many log files. Which of the following command and flag combinations should the administrator use?

A.

tr -d

B.

uniq -c

C.

wc -m

D.

grep -c

Full Access
Question # 29

Which term best describes an asset's susceptibility to damage or loss due to a threat?

A.

Exposure

B.

Attack

C.

Breach

D.

Threat

Full Access
Question # 30

The statement of applicability (SOA) document forms a fundamental part of which framework?

A.

Generally Accepted Privacy Principles (GAPP)

B.

HIPAA

C.

NIST Privacy Framework

D.

ISO/IEC 27000 series

Full Access
Question # 31

According to Payment Card Industry Data Security Standard (PCI DSS) compliance requirements, an organization must retain logs for what length of time?

A.

3 months

B.

6 months

C.

1 year

D.

5 years

Full Access
Question # 32

What are three examples of incident response? (Choose three.)

A.

Dealing with systems that are suspected to be used to commit a crime

B.

Collecting data from computer media

C.

Dealing with systems suspected to be the victim of a crime

D.

Analyzing a system

E.

Threat Modeling

Full Access
Question # 33

An incident response team is concerned with verifying the integrity of security information and event

management (SIEM) events after being written to disk. Which of the following represents the BEST option for addressing this concern?

A.

Time synchronization

B.

Log hashing

C.

Source validation

D.

Field name consistency

Full Access
Question # 34

An organization was recently hit with a ransomware attack that encrypted critical documents and files that were stored on the corporate file server.

Which of the following provides the organization with the BEST chance for recovering their data?

A.

Application white listing!

B.

Antivirus software

C.

Paying the ransom

D.

Offsite backups

Full Access
Question # 35

What is the definition of a security breach?

A.

An event or series of correlated events that indicate a potential violation of some control or policy.

B.

Unauthorized access that violates the authentication, authorization, and accounting of an information asset through intentional access, destruction, or manipulation of an information asset.

C.

An event or series of uncorrelated events that indicate a potential violation of some control or policy has occurred.

D.

Unauthorized access that violates the confidentiality, integrity, or availability of an information asset in the form of unintentional access, destruction, or manipulation of an information asset.

Full Access
Question # 36

Which two answer options are the BEST reasons to conduct post-incident reviews after an incident occurs in an organization? (Choose two.)

A.

To help leverage automated scanning tools and ad hoc tests

B.

To help identify lessons learned and follow-up action.

C.

To help identify event detection information.

D.

To help prevent an incident recurrence.

Full Access
Question # 37

Which of the following is susceptible to a cache poisoning attack?

A.

Domain Name System (DNS)

B.

Secure Shell (SSH)

C.

Hypertext Transfer Protocol Secure (HTTPS)

D.

Hypertext Transfer Protocol (HTTP)

Full Access
Question # 38

Which common source of vulnerability should be addressed to BEST mitigate against URL redirection attacks?

A.

Application

B.

Users

C.

Network infrastructure

D.

Configuration files

Full Access
Question # 39

Which of the following is the GREATEST risk of having security information and event management (SIEM) collect computer names with older log entries?

A.

There may be duplicate computer names on the network.

B.

The computer name may not be admissible evidence in court.

C.

Domain Name System (DNS) records may have changed since the log was created.

D.

There may be field name duplication when combining log files.

Full Access
Question # 40

During a security investigation, a suspicious Linux laptop is found in the server room. The laptop is processing information and indicating network activity. The investigator is preparing to launch an investigation to

determine what is happening with this laptop. Which of the following is the MOST appropriate set of Linux commands that should be executed to conduct the investigation?

A.

iperf, traceroute, whois, ls, chown, cat

B.

iperf, wget, traceroute, dc3dd, ls, whois

C.

lsof, chmod, nano, whois, chown, ls

D.

lsof, ifconfig, who, ps, ls, tcpdump

Full Access
Question # 41

When attempting to determine which system or user is generating excessive web traffic, analysis of which of

the following would provide the BEST results?

A.

Browser logs

B.

HTTP logs

C.

System logs

D.

Proxy logs

Full Access
Question # 42

Which of the following is BEST suited to prevent piggybacking into a sensitive or otherwise restricted area of a facility?

A.

Mantrap

B.

PIN

C.

Biometric controls

D.

ID Card

Full Access
Question # 43

During the forensic analysis of a compromised computer image, the investigator found that critical files are missing, caches have been cleared, and the history and event log files are empty. According to this scenario, which of the following techniques is the suspect using?

A.

System hardening techniques

B.

System optimization techniques

C.

Defragmentation techniques

D.

Anti-forensic techniques

Full Access
Question # 44

If an organization suspects criminal activity during the response to an incident, when should they notify law enforcement authorities?

A.

After one day of network downtime.

B.

According to a pre-defined cost threshold.

C.

As soon as criminal activity is suspected.

D.

After the criminal activity is confirmed.

Full Access
Question # 45

Which of the following security best practices should a web developer reference when developing a new web- based application?

A.

Control Objectives for Information and Related Technology (COBIT)

B.

Risk Management Framework (RMF)

C.

World Wide Web Consortium (W3C)

D.

Open Web Application Security Project (OWASP)

Full Access
Question # 46

To minimize vulnerability, which steps should an organization take before deploying a new Internet of Things (IoT) device? (Choose two.)

A.

Changing the default password

B.

Updating the device firmware

C.

Setting up new users

D.

Disabling IPv6

E.

Enabling the firewall

Full Access
Question # 47

Which three answer options are password attack methods and techniques? (Choose three.)

A.

Cross-Site Scripting attack

B.

Brute force attack

C.

Man-in-the-middle attack

D.

Hybrid attack

E.

Dictionary attack

Full Access
Question # 48

Which of the following is an automated password cracking technique that uses a combination of uppercase and lowercase letters, 0-9 numbers, and special characters?

A.

Dictionary attack

B.

Password guessing

C.

Brute force attack

D.

Rainbow tables

Full Access
Question # 49

When performing a vulnerability assessment from outside the perimeter, which of the following network devices is MOST likely to skew the scan results?

A.

Access Point

B.

Router

C.

Firewall

D.

IDS

E.

Switch

Full Access
Question # 50

An organization wants to deploy a network security tool to alert them but not block malicious activity and network traffic. Which of the following tools would BEST meet the organization's needs?

A.

IPS

B.

IDS

C.

Firewall

D.

EDR

Full Access
Question # 51

Which of the following sources is best suited for monitoring threats and vulnerabilities?

A.

QVVASP

B.

CVE

C.

DISA STIG

D.

SANS

Full Access
Question # 52

After imaging a disk as part of an investigation, a forensics analyst wants to hash the image using a tool that supports piecewise hashing. Which of the following tools should the analyst use?

A.

md5sum

B.

sha256sum

C.

md5deep

D.

hashdeep

Full Access
Question # 53

During which phase of a vulnerability assessment would a security consultant need to document a requirement to retain a legacy device that is no longer supported and cannot be taken offline?

A.

Conducting post-assessment tasks

B.

Determining scope

C.

Identifying critical assets

D.

Performing a vulnerability scan

Full Access
Question # 54

Which approach to cybersecurity involves a series of defensive mechanisms that are layered to protect valuable data and information?

A.

Network segmentation

B.

Defense in depth

C.

Tiered security

D.

Endpoint detection and response

Full Access