Special Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CFR-410 Exam Dumps - CertNexus CyberSec First Responder Questions and Answers

Question # 44

Which of the following security best practices should a web developer reference when developing a new web- based application?

Options:

A.

Control Objectives for Information and Related Technology (COBIT)

B.

Risk Management Framework (RMF)

C.

World Wide Web Consortium (W3C)

D.

Open Web Application Security Project (OWASP)

Buy Now
Question # 45

During which phase of a vulnerability assessment would a security consultant need to document a requirement to retain a legacy device that is no longer supported and cannot be taken offline?

Options:

A.

Conducting post-assessment tasks

B.

Determining scope

C.

Identifying critical assets

D.

Performing a vulnerability scan

Buy Now
Question # 46

Which standard was implemented in the United States to protect the privacy of patient medical information through restricted access to medical records and regulations for sharing medical records?

Options:

A.

NIST

B.

GLBA

C.

SOX

D.

HIPAA

Buy Now
Question # 47

Which of the following are legally compliant forensics applications that will detect an alternative data stream (ADS) or a file with an incorrect file extension? (Choose two.)

Options:

A.

Disk duplicator

B.

EnCase

C.

dd

D.

Forensic Toolkit (FTK)

E.

Write blocker

Buy Now
Question # 48

A security investigator has detected an unauthorized insider reviewing files containing company secrets.

Which of the following commands could the investigator use to determine which files have been opened by this user?

Options:

A.

ls

B.

lsof

C.

ps

D.

netstat

Buy Now
Question # 49

An administrator investigating intermittent network communication problems has identified an excessive amount of traffic from an external-facing host to an unknown location on the Internet. Which of the following

BEST describes what is occurring?

Options:

A.

The network is experiencing a denial of service (DoS) attack.

B.

A malicious user is exporting sensitive data.

C.

Rogue hardware has been installed.

D.

An administrator has misconfigured a web proxy.

Buy Now
Question # 50

Which two answer options are the BEST reasons to conduct post-incident reviews after an incident occurs in an organization? (Choose two.)

Options:

A.

To help leverage automated scanning tools and ad hoc tests

B.

To help identify lessons learned and follow-up action.

C.

To help identify event detection information.

D.

To help prevent an incident recurrence.

Buy Now
Question # 51

The "right to be forgotten" is considered a core tenet of which of the following privacy-focused acts or regulations?

Options:

A.

GDPR

B.

CCPA

C.

PPA

D.

HIPPA

E.

COPPA

Buy Now
Question # 52

A suspicious script was found on a sensitive research system. Subsequent analysis determined that proprietary data would have been deleted from both the local server and backup media immediately following a specific administrator’s removal from an employee list that is refreshed each evening. Which of the following BEST describes this scenario?

Options:

A.

Backdoor

B.

Rootkit

C.

Time bomb

D.

Login bomb

Buy Now
Question # 53

After a hacker obtained a shell on a Linux box, the hacker then sends the exfiltrated data via Domain Name System (DNS). This is an example of which type of data exfiltration?

Options:

A.

Covert channels

B.

File sharing services

C.

Steganography

D.

Rogue service

Buy Now
Exam Code: CFR-410
Exam Name: CyberSec First Responder (CFR) Exam
Last Update: Apr 1, 2025
Questions: 180
CFR-410 pdf

CFR-410 PDF

$25.5  $84.99
CFR-410 Engine

CFR-410 Testing Engine

$28.5  $94.99
CFR-410 PDF + Engine

CFR-410 PDF + Testing Engine

$40.5  $134.99