Special Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CFR-410 Exam Dumps - CertNexus CyberSec First Responder Questions and Answers

Question # 14

Which of the following, when exposed together, constitutes PII? (Choose two.)

Options:

A.

Full name

B.

Birth date

C.

Account balance

D.

Marital status

E.

Employment status

Buy Now
Question # 15

Which of the following sources is best suited for monitoring threats and vulnerabilities?

Options:

A.

QVVASP

B.

CVE

C.

DISA STIG

D.

SANS

Buy Now
Question # 16

When reviewing log files from a recent incident, the response team discovers that most of the network-based indicators are IP-based. It would be helpful to the response team if they could resolve those IP-based indicators to hostnames. Which of the following is BEST suited for this task?

Options:

A.

DNS

B.

RIP

C.

WINS

D.

NTP

E.

NFS

Buy Now
Question # 17

A security professional discovers a new ransomware strain that disables antivirus on the endpoint during an

infection. Which location would be the BEST place for the security professional to find technical information about this malware?

Options:

A.

Threat intelligence feeds

B.

Computer emergency response team (CERT) press releases

C.

Vulnerability databases

D.

Social network sites

Buy Now
Question # 18

Which of the following is a method of reconnaissance in which a ping is sent to a target with the expectation of receiving a response?

Options:

A.

Active scanning

B.

Passive scanning

C.

Network enumeration

D.

Application enumeration

Buy Now
Question # 19

In which of the following attack phases would an attacker use Shodan?

Options:

A.

Scanning

B.

Reconnaissance

C.

Gaining access

D.

Persistence

Buy Now
Question # 20

Which of the following attacks involves sending a large amount of spoofed User Datagram Protocol (UDP) traffic to a router’s broadcast address within a network?

Options:

A.

Land attack

B.

Fraggle attack

C.

Smurf attack

D.

Teardrop attack

Buy Now
Question # 21

What describes the BEST approach for developing a plan to continuously assess and track vulnerabilities on all organizational assets and infrastructure in order to remediate and minimize the opportunity for attacks?

Options:

A.

Establish and maintain a risk-based remediation strategy.

B.

Establish and maintain detailed enterprise asset inventory.

C.

Establish and maintain a data classification scheme.

D.

Establish and maintain a data management process.

Buy Now
Question # 22

Which of the following methods are used by attackers to find new ransomware victims? (Choose two.)

Options:

A.

Web crawling

B.

Distributed denial of service (DDoS) attack

C.

Password guessing

D.

Phishing

E.

Brute force attack

Buy Now
Question # 23

After successfully enumerating the target, the hacker determines that the victim is using a firewall. Which of the following techniques would allow the hacker to bypass the intrusion prevention system (IPS)?

Options:

A.

Stealth scanning

B.

Xmas scanning

C.

FINS scanning

D.

Port scanning

Buy Now
Exam Code: CFR-410
Exam Name: CyberSec First Responder (CFR) Exam
Last Update: Apr 1, 2025
Questions: 180
CFR-410 pdf

CFR-410 PDF

$25.5  $84.99
CFR-410 Engine

CFR-410 Testing Engine

$28.5  $94.99
CFR-410 PDF + Engine

CFR-410 PDF + Testing Engine

$40.5  $134.99