Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

CyberSec First Responder CFR-210 Updated Exam

Page: 2 / 4
Total 100 questions

Logical Operations CyberSec First Responder Questions and Answers

Question 5

An incident responder suspects that a host behind a firewall is infected with malware. Which of the following should the responder use to find the IP address of the infected machine?

Options:

A.

NAT table

B.

ARP cache

C.

DNS cache

D.

CAM cable

Question 6

An incident responder is asked to work with the IT department to address patch management issues with the company servers. Which of the following is the BEST source for the incident responder to obtain the CVEs for the latest industry-recognized patches?

Options:

A.

Vulnerabilities database

B.

Intelligence feeds

C.

Security journals

D.

Security blogs

Question 7

A forensics investigator has been assigned the task of investigating a system user for suspicion of using a company-owned workstation to view unauthorized content. Which of the following would be a proper course of action for the investigator to take?

Options:

A.

Notify the user that their workstation is being confiscated to perform an investigation, providing no details as to the reasoning.

B.

Confiscate the workstation while the suspected employee is out of the office, andperform a search on the asset.

C.

Confiscate the workstation while the suspected employee is out of the office, and perform the search on bit-for-bit image of the hard drive.

D.

Notify the user that the workstation is being confiscated to perform an investigation, providing complete transparency as to the suspicions.

Question 8

Drag and drop the following steps to perform a successful social engineering attack in the correct order, from first (1) to last (6).

Options:

Page: 2 / 4
Total 100 questions