Free CFR-310 Exam Braindumps (page: 12)

Page 11 of 26

After successfully enumerating the target, the hacker determines that the victim is using a firewall. Which of the following techniques would allow the hacker to bypass the intrusion prevention system (IPS)?

  1. Stealth scanning
  2. Xmas scanning
  3. FINS scanning
  4. Port scanning

Answer(s): C


Reference:

https://nmap.org/book/firewall-subversion.html



A common formula used to calculate risk is: ________________+ Threats + Vulnerabilities = Risk.

Which of the following represents the missing factor in this formula?

  1. Exploits
  2. Security
  3. Asset
  4. Probability

Answer(s): C


Reference:

https://www.threatanalysis.com/2010/05/03/threat-vulnerability-risk-commonly-mixed-up-terms/



Recently, a cybersecurity research lab discovered that there is a hacking group focused on hacking into the computers of financial executives in Company A to sell the exfiltrated information to Company B. Which of the following threat motives does this MOST likely represent?

  1. Desire for power
  2. Association/affiliation
  3. Reputation/recognition
  4. Desire for financial gain

Answer(s): D



It was recently discovered that many of an organization’s servers were running unauthorized cryptocurrency mining software. Which of the following assets were being targeted in this attack? (Choose two.)

  1. Power resources
  2. Network resources
  3. Disk resources
  4. Computing resources
  5. Financial resources

Answer(s): A,B


Reference:

https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/security-101-the-impact-of-cryptocurrency-mining-malware






Post your Comments and Discuss CertNexus CFR-310 exam with other Community members:

CFR-310 Discussions & Posts