Free CyberSec First Responder Exam CFR-410 Exam Practice Test

UNLOCK FULL
CFR-410 Exam Features
In Just $59 You can Access
  • All Official Question Types
  • Interactive Web-Based Practice Test Software
  • No Installation or 3rd Party Software Required
  • Customize your practice sessions (Free Demo)
  • 24/7 Customer Support
Page: 1 / 20
Total Questions: 100
  • Which of the following technologies would reduce the risk of a successful SQL injection attack?

    Answer: B Next Question
  • An organization recently suffered a breach due to a human resources administrator emailing employee names and Social Security numbers to a distribution list. Which of the following tools would help mitigate this risk from recurring?

    Answer: A Next Question
  • Various logs are collected for a data leakage case to make a forensic analysis. Which of the following areMOST important for log integrity? (Choose two.)

    Answer: A, B Next Question
  • During a security investigation, a suspicious Linux laptop is found in the server room. The laptop is processing information and indicating network activity. The investigator is preparing to launch an investigation todetermine what is happening with this laptop. Which of the following is the MOST appropriate set of Linux commands that should be executed to conduct the investigation?

    Answer: B Next Question
  • A government organization responsible for critical infrastructure is being attacked and files on the server been deleted. Which of the following are the most immediate communications that should be made regarding the incident? (Choose two.)

    Answer: C, E Next Question
  • An incident responder discovers that the CEO logged in from their New York City office and then logged in from a location in Beijing an hour later. The incident responder suspects that the CEO's account has beencompromised. Which of the following anomalies MOST likely contributed to the incident responder's suspicion?

    Answer: C Next Question
  • While performing routing maintenance on a Windows Server, a technician notices several unapproved Windows Updates and that remote access software has been installed. The technician suspects that a malicious actor has gained access to the system. Which of the following steps in the attack process does this activity indicate?

    Answer: A Next Question
  • An unauthorized network scan may be detected by parsing network sniffer data for:

    Answer: C Next Question
  • A company that maintains a public city infrastructure was breached and information about future city projects was leaked. After the post-incident phase of the process has been completed, which of the following would bePRIMARY focus of the incident response team?

    Answer: B Next Question
  • A network security analyst has noticed a flood of Simple Mail Transfer Protocol (SMTP) traffic to internal clients. SMTP traffic should only be allowed to email servers. Which of the following commands would stop this attack? (Choose two.)

    Answer: A, C Next Question
Page: 1 / 20
Total Questions: 100