Download Logical Operations.CFR-210.CertDumps.2017-12-18.100q.vcex

Download Exam

File Info

Exam CyberSec First Responder
Number CFR-210
File Name Logical Operations.CFR-210.CertDumps.2017-12-18.100q.vcex
Size 3 MB
Posted Dec 18, 2017
Download Logical Operations.CFR-210.CertDumps.2017-12-18.100q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%



Exam Hub discount


Demo Questions

Question 1

An attacker performs reconnaissance on a Chief Executive Officer (CEO) using publicity available resources to gain access to the CEO’s office. The attacker was in the CEO’s office for less than five minutes, and the attack left no traces in any logs, nor was there any readily identifiable cause for the exploit. The attacker in then able to use numerous credentials belonging to the CEO to conduct a variety of further attacks. Which of the following types of exploit is described?


  1. Pivoting
  2. Malicious linking
  3. Whaling
  4. Keylogging
Correct answer: C
Explanation:
Reference:http://searchsecurity.techtarget.com/definition/whaling
Reference:http://searchsecurity.techtarget.com/definition/whaling



Question 2

Which of the following is an automated password cracking technique that uses a combination of upper and lower case letters, 0-9 numbers, and special characters?


  1. Dictionary attack
  2. Password guessing
  3. Brute force attack
  4. Rainbow tables
Correct answer: C
Explanation:
Reference:https://www.password-depot.com/know-how/brute-force-attacks.htm
Reference:https://www.password-depot.com/know-how/brute-force-attacks.htm



Question 3

A zero-day vulnerability is discovered on a company’s network. The security analyst conducts a log review, schedules an immediate vulnerability scan, and quarantines the infected system, but cannot determine the root cause of the vulnerability. Which of the following is a source of information that can be used to identify the cause of the vulnerability?


  1. www.virustotal.com
  2. Security RSS feeds
  3. Security software websites
  4. Government websites
Correct answer: C
Explanation:
Reference:http://security.stackexchange.com/questions/47097/how-are-zero-days-found
Reference:http://security.stackexchange.com/questions/47097/how-are-zero-days-found



Question 4

The Chief Information Officer (CIO) of a company asks the incident responder to update the risk management plan. 
Which of the following methods can BEST help the incident responder identify the risks that require in-depth analysis?


  1. Qualitative analysis
  2. Targeted risk analysis
  3. Non-targeted risk analysis
  4. Quantitative analysis
Correct answer: D
Explanation:
Reference:https://www.passionatepm.com/blog/qualitative-risk-analysis-vs-quantitative-risk-analysis-pmp-concept-1
Reference:https://www.passionatepm.com/blog/qualitative-risk-analysis-vs-quantitative-risk-analysis-pmp-concept-1



Question 5

A security analyst for a financial services firm is monitoring blogs and reads about a zero-day vulnerability being exploited by a little-known group of hackers. The analyst wishes to independently validate and corroborate the blog’s posting. Which of the following sources of information will provide the MOST credible supporting threat intelligence in this situation?


  1. Similar cybersecurity blogs
  2. Threat intelligence sharing groups
  3. Computer emergency response team press release
  4. Internet searches on zero-day exploits
Correct answer: C
Explanation:
Reference:http://whatis.techtarget.com/definition/CERT-Computer-Emergency-Readiness-Team
Reference:http://whatis.techtarget.com/definition/CERT-Computer-Emergency-Readiness-Team



Question 6

Which of the following could an attacker use to perpetrate a social engineering attack? (Choose two.)


  1. Keylogger
  2. Yagi
  3. Company uniform
  4. Blackdoor
  5. Phone call
Correct answer: AE



Question 7

During review of a company’s web server logs, the following items are discovered:
2015-03-01 03:32:11 www.example.com/index.asp?id=-999 or 1=convert(int,@@version)—
2015-03-01 03:35:33 www.example.com/index.asp?id=-999 or 1=convert(int,db_name())—
2015-03-01 03:38:25 www.example.com/index.asp?id=-999 or 1=convert(int,user_name())—
Which of the following is depicted in the log example above?


  1. An administrator using the web interface for application maintenance
  2. Normal web application traffic
  3. A web application scan
  4. An attempt at enumeration via SQL injection
Correct answer: D
Explanation:
Reference:http://blog.gojhonny.com/2013/08/sql-injection-database-enumeration-notes.html
Reference:http://blog.gojhonny.com/2013/08/sql-injection-database-enumeration-notes.html



Question 8

An attacker has exfiltrated the SAM file from a Windows workstation. Which of the following attacks is MOST likely being perpetrated?


  1. user enumeration
  2. Brute forcing
  3. Password sniffing
  4. Hijacking/rooting
Correct answer: C
Explanation:
Reference:http://hackersonlineclub.com/to-hack-window-passwords/
Reference:http://hackersonlineclub.com/to-hack-window-passwords/



Question 9

Which of the following describes the MOST important reason for capturing post-attack metadata?


  1. To assist in updating the Business Continuity Plan
  2. To assist in writing a security magazine article
  3. To assist in fortification of defenses to prevent future attacks
  4. To assist in improving security awareness training
Correct answer: C



Question 10

Drag and drop the following steps to perform a successful social engineering attack in the correct order, from first (1) to last (6). 
 


Correct answer: To work with this question, an Exam Simulator is required.









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files