Ready to Pass Your Certification Test

Ready to guarantee a pass on the certification that will elevate your career? Visit this page to explore our catalog and get the questions and answers you need to ace the test.

certnexus CFR_310

Custom view settings

Exam contains 100 questions

Page 4 of 17
Question 19 🔥

A network administrator has determined that network performance has degraded due to excessive use of social media and Internet streaming services. Which of the following would be effective for limiting access to these types of services, without completely restricting access to a site?

Which database solution meets these requirements?
Highly voted
Highly voted
Highly voted
Highly voted
Discussion of the question
Question 20 🔥

An administrator believes that a system on VLAN 12 is Address Resolution Protocol (ARP) poisoning clients on the network. The administrator attaches a system to VLAN 12 and uses Wireshark to capture traffic. After reviewing the capture file, the administrator finds no evidence of ARP poisoning. Which of the following actions should the administrator take next?

Which database solution meets these requirements?
Highly voted
Highly voted
Highly voted
Highly voted
Discussion of the question
Question 21 🔥

A security investigator has detected an unauthorized insider reviewing files containing company secrets. Which of the following commands could the investigator use to determine which files have been opened by this user?

Which database solution meets these requirements?
Highly voted
Highly voted
Highly voted
Highly voted
Discussion of the question
Question 22 🔥

While performing routing maintenance on a Windows Server, a technician notices several unapproved Windows Updates and that remote access software has been installed. The technician suspects that a malicious actor has gained access to the system. Which of the following steps in the attack process does this activity indicate?

Which database solution meets these requirements?
Highly voted
Highly voted
Highly voted
Highly voted
Discussion of the question
Question 23 🔥

Which of the following types of attackers would be MOST likely to use multiple zero-day exploits executed against high-value, well-defended targets for the purposes of espionage and sabotage?

Which database solution meets these requirements?
Highly voted
Highly voted
Highly voted
Highly voted
Discussion of the question
Question 24 🔥

A network security analyst has noticed a flood of Simple Mail Transfer Protocol (SMTP) traffic to internal clients. SMTP traffic should only be allowed to email servers. Which of the following commands would stop this attack? (Choose two.)

Which database solution meets these requirements?
Highly voted
Highly voted
Highly voted
Highly voted
Highly voted
Discussion of the question

Lorem ipsum dolor sit amet consectetur. Eget sed turpis aenean sit aenean. Integer at nam ullamcorper a.

© 2024 Exam Prepare, Inc. All Rights Reserved.