Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the Logical Operations CyberSec First Responder CFR-210 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam CFR-210 Premium Access

View all detail and faqs for the CFR-210 exam


807 Students Passed

96% Average Score

91% Same Questions
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

To redact or obfuscate sensitive data, a company requires its name be changed throughout a port-incident report. Using a Linux sed command, which of the following will replace the company’s name with “Acme”?

Options:

A.

/Orange/Acme/g

B.

s/Acme/Orange/g

C.

/Acme/Orange/g

D.

s/Orange/Acme/g

Questions # 12:

A logfile generated from a Windows server was moved to a Linux system for further analysis. A system administrator is now making edits to the file with vi and notices the file contains numerous instances of Ctrl-M (^M) characters. Which of the following command line tools is the administrator MOST likely to use to remove these characters from the logfile? (Choose two.)

Options:

A.

tr

B.

cut

C.

cat

D.

unix2dos

E.

awk

Questions # 13:

Question # 13

The above Linux command is used to search for:

Options:

A.

MAC addresses.

B.

memory addresses.

C.

IPv4 addresses.

D.

IPv6 addresses.

Questions # 14:

An attacker has decided to attempt a brute force attack on a UNIX server. In order to accomplish this, which of the following steps must be performed?

Options:

A.

Exfiltrate the shadow and SAM, run unshadow, and then runa password cracking utility on the output file.

B.

Exfiltrate the shadow and passwd, and then run a password cracking utility on both files.

C.

Exfiltrate the shadow and SAM, and then run a password cracking utility on both files.

D.

Exfiltrate the shadowand passwd, run unshadow, and then run a password cracking utility on the output file.

Questions # 15:

Which of the following commands should be used to print out ONLY the second column of items in the following file?

Source_File,txt

Alpha Whiskey

Bravo Tango

Charlie Foxtrot

Echo Oscar

Delta Roger

Options:

A.

cut –d “ “ –f2 source_file.txt

B.

cut –b7-15 source_file.txt

C.

cut –d “ “ –f2 Source_File.txt

D.

cut –c6-12 Source_File.txt

Questions # 16:

When performing an investigation, a security analyst needs to extract information from text files in a Windows operating system. Which of the following commands should the security analyst use?

Options:

A.

findstr

B.

grep

C.

awk

D.

sigverif

Questions # 17:

A UNIX workstation has been compromised. The security analyst discovers high CPU usage during off-hours on the workstation. Which of the following UNIX programs can be used to detect the rogue process? (Choose two.)

Options:

A.

arp

B.

ps

C.

who

D.

dd

E.

top

Questions # 18:

The Chief Information Officer (CIO) of a company asks the incident responder to update the risk management plan. Which of the following methods can BEST help the incident responder identify the risks that require in-depth analysis?

Options:

A.

Qualitative analysis

B.

Targeted risk analysis

C.

Non-targeted risk analysis

D.

Quantitative analysis

Questions # 19:

A hacker’s end goal is to target the Chief Financial Officer (CFO) of a bank. Which of the following describes this social engineering tactic?

Options:

A.

Vishing

B.

Pharming

C.

Spear phishing

D.

Whaling

Questions # 20:

While performing standard maintenance on a UNIX server, a system administrator notices a set of large files with .tar .gz file extensions in the /tmp folder. The system administrator reports this to a security analyst. Performing further research, the analyst has found the .tar .gz files contain information normally housed on one of the bank’s data servers. Given this scenario, which of the following is MOST likely occurring?

Options:

A.

A malicious actor, having breached the system, is staging collected data for exfiltration.

B.

Having nearly exhausted the capacity of the home directory, a user is moving files to make room.

C.

An error on the .hosts file has resultedin the data being backed up to the wrong server.

D.

One of the newly hired system administrators has inadvertently backed up data to the wrong server.

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.