Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the Logical Operations CyberSec First Responder CFR-210 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam CFR-210 Premium Access

View all detail and faqs for the CFR-210 exam


807 Students Passed

96% Average Score

91% Same Questions
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

During review of a company’s web server logs, the following items are discovered:

2015-03-01 03:32:11 www.example.com/index.asp?id=-999 or 1=convert(int,@@version)—

2015-03-01 03:35:33 www.example.com/index.asp?id=-999 or 1=convert(int,db_name())—

2015-03-01 03:38:25 www.example.com/index.asp?id=-999 or 1=convert(int,user_name())—

Which of the following is depicted in the log example above?

Options:

A.

An administrator using the web interface for application maintenance

B.

Normal web application traffic

C.

A web application scan

D.

An attempt at enumeration via SQL injection

Questions # 22:

During the course of an investigation, an incident responder discovers illegal material on a user’s hard drive. Which of the following is the incident responder’s MOST important next step?

Options:

A.

Notify management

B.

Place the hard drive in an evidence bag

C.

Image the hard drive

D.

Restrict the user’s access

Questions # 23:

An incident responder is investigating a Linux server reported to be “behaving strangely”. Which of the following commands should the incident responder use to identify any users currently logged into the system? (Choose two.)

Options:

A.

Isof

B.

Is

C.

id

D.

w

E.

lastlog

Questions # 24:

A malicious attacker has compromised a database by implementing a Python-based script that will automatically establish an SSH connection daily between the hours of 2:00 am and 5:00 am. Which of the following is the MOST common motive for the attack vector that was used?

Options:

A.

Pivoting

B.

Persistence/maintaining access

C.

Exfiltration

D.

Lateral movement

Questions # 25:

A DMZ web server has been compromised. During the log review, the incident responder wants to parse all common internal Class A addresses from the log. Which of the following commands should the responder use to accomplish this?

Options:

A.

grep –x”(10.[0-9]+.[0-9]+.[0-9]+)” etc/rc.d/apache2/access.log | output.txt

B.

grep –x”(192.168.[0.9]+[0-9])” bin/apache2/access.log | output.txt

C.

grep –v”(10.[0-9]+.[0-9]+.[0-9]+)” /var/log/apache2/access.log > output.txt

D.

grep –v”(192.168.[0.9]+[0-9]+)” /var/log/apache2/access.log > output.txt

Questions # 26:

Click the exhibit button. After reviewing captured network traffic logs, a security auditor suspects a violation of the organization’s computer use policy. Which of the following is the likely indicator of the violation?

Question # 26

Question # 26

Options:

A.

Unauthorized programs

B.

Malicious software

C.

Service disruption

D.

Registry entries

E.

New user account

Questions # 27:

A computer attacker has compromised a system by implanting a script that will send 10B packages over port 150. This port is also used for sending heartbeat messages to a central monitoring server. Which of the following BEST describes the tactic used to execute this attack?

Options:

A.

Covert channels

B.

Logic bomb

C.

Backdoors

D.

ICMP redirect

Questions # 28:

Organizations should exercise their Incident Response (IR) plan following initial creation. The primary objective for this first IR plan exercise is to identify:

Options:

A.

deficiencies in cyber security incident response team skills.

B.

gaps or overlaps in supporting processes and procedures.

C.

critical steps required in the case of an incident.

D.

capabilities required to improve response time.

Questions # 29:

Which of the following logs should be checked to determine if an internal user connected to a potentially malicious website? (Choose two.)

Options:

A.

FTP logs

B.

Email logs

C.

Firewall logs

D.

Proxy logs

E.

HTTP logs

Questions # 30:

A zero-day vulnerability is discovered on a company’s network. The security analyst conducts a log review, schedules an immediate vulnerability scan, and quarantines the infected system, but cannot determine the root cause of the vulnerability. Which of the following is a source of information that can be used to identify the cause of the vulnerability?

Options:

A.

www.virustotal.com

B.

Security RSS feeds

C.

Security software websites

D.

Government websites

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.