New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CyberSec First Responder CFR-210 Dumps PDF

Page: 4 / 4
Total 100 questions

Logical Operations CyberSec First Responder Questions and Answers

Question 13

A security analyst would like to parse through several SQL logs for indicators of compromise. The analyst is aware that none of the fields should contain a string of text longer than 30 characters; however, the analyst is unaware if there are any implemented controls to prevent such an overflow. Which of the following BEST describes the regular expression the analyst should use to find any alphanumeric character string?

Options:

A.

/^[a-zA-Z0-9]{5,30}$/

B.

/^[a-zA-Z-9]{30}$/

C.

/^[a-zA-Z]{5,30}$/

D.

/^[a-Z0-9]{5,30}$/

Question 14

An organization performs regular updates to its network devices to alert and prevent access to streaming media sites by the employees. Each device will send logs and alerts to a centralized server for storage, archive, and analysis. Which of the following BEST describes the system that is correlating the data found in all alerts and logs?

Options:

A.

SIEM

B.

NIDS

C.

HIPS

D.

WIPS

Question 15

A security analyst discovers a zero-day vulnerability affecting Windows, which has not been publicly identified. The security analyst assumes this vulnerability is present on millions of computer system and feels an obligation to share this information with other security professionals. Which of the following would be the MOST adverse consequences of the analyst sharing this information?

Options:

A.

Public exposure of the vulnerability, including to potential attackers

B.

Unexpected media coverage of the discovery

C.

Potential distribution of misinformation

D.

Possible legal consequences for the analyst

Page: 4 / 4
Total 100 questions