Ready to Pass Your Certification Test

Ready to guarantee a pass on the certification that will elevate your career? Visit this page to explore our catalog and get the questions and answers you need to ace the test.

certnexus CFR_310

Custom view settings

Exam contains 100 questions

Page 1 of 17
Question 1 🔥

A secretary receives an email from a friend with a picture of a kitten in it. The secretary forwards it to the ~COMPANYWIDE mailing list and, shortly thereafter, users across the company receive the following message:“You seem tense. Take a deep breath and relax!”The incident response team is activated and opens the picture in a virtual machine to test it. After a short analysis, the following code is found in C:\Temp\chill.exe:Powershell.exe –Command “do {(for /L %i in (2,1,254) do shutdown /r /m Error! Hyperlink reference not valid.> /f /t / 0 (/c “You seem tense. Take a deep breath and relax!”);Start-Sleep –s 900) } while(1)”Which of the following BEST represents what the attacker was trying to accomplish?

Which database solution meets these requirements?
Highly voted
Highly voted
Highly voted
Highly voted
Discussion of the question
Question 2 🔥

A Linux system administrator found suspicious activity on host IP 192.168.10.121. This host is also establishing a connection to IP 88.143.12.123. Which of the following commands should the administrator use to capture only the traffic between the two hosts?

Which database solution meets these requirements?
Highly voted
Highly voted
Highly voted
Highly voted
Discussion of the question
Question 3 🔥

After imaging a disk as part of an investigation, a forensics analyst wants to hash the image using a tool that supports piecewise hashing. Which of the following tools should the analyst use?

Which database solution meets these requirements?
Highly voted
Highly voted
Highly voted
Highly voted
Discussion of the question
Question 4 🔥

Which of the following is a cybersecurity solution for insider threats to strengthen information protection?

Which database solution meets these requirements?
Highly voted
Highly voted
Highly voted
Highly voted
Discussion of the question
Question 5 🔥

A security administrator is investigating a compromised host. Which of the following commands could the investigator use to display executing processes in real time?

Which database solution meets these requirements?
Highly voted
Highly voted
Highly voted
Highly voted
Discussion of the question
Question 6 🔥

A network security analyst has noticed a flood of Simple Mail Transfer Protocol (SMTP) traffic to internal clients. SMTP traffic should only be allowed to email servers. Which of the following commands would stop this attack? (Choose two.)

Which database solution meets these requirements?
Highly voted
Highly voted
Highly voted
Highly voted
Highly voted
Discussion of the question

Lorem ipsum dolor sit amet consectetur. Eget sed turpis aenean sit aenean. Integer at nam ullamcorper a.

© 2024 Exam Prepare, Inc. All Rights Reserved.