Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

CFR-410 CertNexus Exam Lab Questions

Page: 3 / 4
Total 100 questions

CyberSec First Responder Questions and Answers

Question 9

A common formula used to calculate risk is:+ Threats + Vulnerabilities = Risk. Which of the following represents the missing factor in this formula?

Options:

A.

Exploits

B.

Security

C.

Asset

D.

Probability

Question 10

Tcpdump is a tool that can be used to detect which of the following indicators of compromise?

Options:

A.

Unusual network traffic

B.

Unknown open ports

C.

Poor network performance

D.

Unknown use of protocols

Question 11

An attacker intercepts a hash and compares it to pre-computed hashes to crack a password. Which of the following methods has been used?

Options:

A.

Password sniffing

B.

Brute force attack

C.

Rainbow tables

D.

Dictionary attack

Question 12

During the forensic analysis of a compromised computer image, the investigator found that critical files are missing, caches have been cleared, and the history and event log files are empty. According to this scenario, which of the following techniques is the suspect using?

Options:

A.

System hardening techniques

B.

System optimization techniques

C.

Defragmentation techniques

D.

Anti-forensic techniques

Page: 3 / 4
Total 100 questions