Download CyberSec First Responder.CFR-210.CertDumps.2017-12-18.100q.vcex

Vendor: Logical Operations
Exam Code: CFR-210
Exam Name: CyberSec First Responder
Date: Dec 18, 2017
File Size: 3 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
An attacker performs reconnaissance on a Chief Executive Officer (CEO) using publicity available resources to gain access to the CEO’s office. The attacker was in the CEO’s office for less than five minutes, and the attack left no traces in any logs, nor was there any readily identifiable cause for the exploit. The attacker in then able to use numerous credentials belonging to the CEO to conduct a variety of further attacks. Which of the following types of exploit is described?
  1. Pivoting
  2. Malicious linking
  3. Whaling
  4. Keylogging
Correct answer: C
Explanation:
Reference:http://searchsecurity.techtarget.com/definition/whaling
Reference:http://searchsecurity.techtarget.com/definition/whaling
Question 2
Which of the following is an automated password cracking technique that uses a combination of upper and lower case letters, 0-9 numbers, and special characters?
  1. Dictionary attack
  2. Password guessing
  3. Brute force attack
  4. Rainbow tables
Correct answer: C
Explanation:
Reference:https://www.password-depot.com/know-how/brute-force-attacks.htm
Reference:https://www.password-depot.com/know-how/brute-force-attacks.htm
Question 3
A zero-day vulnerability is discovered on a company’s network. The security analyst conducts a log review, schedules an immediate vulnerability scan, and quarantines the infected system, but cannot determine the root cause of the vulnerability. Which of the following is a source of information that can be used to identify the cause of the vulnerability?
  1. www.virustotal.com
  2. Security RSS feeds
  3. Security software websites
  4. Government websites
Correct answer: C
Explanation:
Reference:http://security.stackexchange.com/questions/47097/how-are-zero-days-found
Reference:http://security.stackexchange.com/questions/47097/how-are-zero-days-found
Question 4
The Chief Information Officer (CIO) of a company asks the incident responder to update the risk management plan. 
Which of the following methods can BEST help the incident responder identify the risks that require in-depth analysis?
  1. Qualitative analysis
  2. Targeted risk analysis
  3. Non-targeted risk analysis
  4. Quantitative analysis
Correct answer: D
Explanation:
Reference:https://www.passionatepm.com/blog/qualitative-risk-analysis-vs-quantitative-risk-analysis-pmp-concept-1
Reference:https://www.passionatepm.com/blog/qualitative-risk-analysis-vs-quantitative-risk-analysis-pmp-concept-1
Question 5
A security analyst for a financial services firm is monitoring blogs and reads about a zero-day vulnerability being exploited by a little-known group of hackers. The analyst wishes to independently validate and corroborate the blog’s posting. Which of the following sources of information will provide the MOST credible supporting threat intelligence in this situation?
  1. Similar cybersecurity blogs
  2. Threat intelligence sharing groups
  3. Computer emergency response team press release
  4. Internet searches on zero-day exploits
Correct answer: C
Explanation:
Reference:http://whatis.techtarget.com/definition/CERT-Computer-Emergency-Readiness-Team
Reference:http://whatis.techtarget.com/definition/CERT-Computer-Emergency-Readiness-Team
Question 6
Which of the following could an attacker use to perpetrate a social engineering attack? (Choose two.)
  1. Keylogger
  2. Yagi
  3. Company uniform
  4. Blackdoor
  5. Phone call
Correct answer: AE
Question 7
During review of a company’s web server logs, the following items are discovered:
2015-03-01 03:32:11 www.example.com/index.asp?id=-999 or 1=convert(int,@@version)—
2015-03-01 03:35:33 www.example.com/index.asp?id=-999 or 1=convert(int,db_name())—
2015-03-01 03:38:25 www.example.com/index.asp?id=-999 or 1=convert(int,user_name())—
Which of the following is depicted in the log example above?
  1. An administrator using the web interface for application maintenance
  2. Normal web application traffic
  3. A web application scan
  4. An attempt at enumeration via SQL injection
Correct answer: D
Explanation:
Reference:http://blog.gojhonny.com/2013/08/sql-injection-database-enumeration-notes.html
Reference:http://blog.gojhonny.com/2013/08/sql-injection-database-enumeration-notes.html
Question 8
An attacker has exfiltrated the SAM file from a Windows workstation. Which of the following attacks is MOST likely being perpetrated?
  1. user enumeration
  2. Brute forcing
  3. Password sniffing
  4. Hijacking/rooting
Correct answer: C
Explanation:
Reference:http://hackersonlineclub.com/to-hack-window-passwords/
Reference:http://hackersonlineclub.com/to-hack-window-passwords/
Question 9
Which of the following describes the MOST important reason for capturing post-attack metadata?
  1. To assist in updating the Business Continuity Plan
  2. To assist in writing a security magazine article
  3. To assist in fortification of defenses to prevent future attacks
  4. To assist in improving security awareness training
Correct answer: C
Question 10
Drag and drop the following steps to perform a successful social engineering attack in the correct order, from first (1) to last (6). 
 
Correct answer: To display the answer, ProfExam Simulator is required.
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!