CertNexus CFR-310 Exam
CyberSec First Responder (Page 3 )

Updated On: 7-Feb-2026

A security administrator is investigating a compromised host. Which of the following commands could the investigator use to display executing processes in real time?

  1. ps
  2. top
  3. nice
  4. pstree

Answer(s): B


Reference:

https://www.cyberciti.biz/faq/show-all-running-processes-in-linux/



A system administrator identifies unusual network traffic from outside the local network. Which of the following is the BEST method for mitigating the threat?

  1. Malware scanning
  2. Port blocking
  3. Packet capturing
  4. Content filtering

Answer(s): C



Which of the following technologies would reduce the risk of a successful SQL injection attack?

  1. Reverse proxy
  2. Web application firewall
  3. Stateful firewall
  4. Web content filtering

Answer(s): B


Reference:

http://www.enterprisenetworkingplanet.com/netsecur/article.php/3866756/10-Ways-to-Prevent-or-Mitigate-SQL-Injection-Attacks.htm



An incident responder has collected network capture logs in a text file, separated by five or more data fields. Which of the following is the BEST command to use if the responder would like to print the file (to terminal/screen) in numerical order?

  1. cat | tac
  2. more
  3. sort –n
  4. less

Answer(s): C


Reference:

https://kb.iu.edu/d/afjb



Which of the following characteristics of a web proxy strengthens cybersecurity? (Choose two.)

  1. Increases browsing speed
  2. Filters unwanted content
  3. Limits direct connection to Internet
  4. Caches frequently-visited websites
  5. Decreases wide area network (WAN) traffic

Answer(s): A,D






Post your Comments and Discuss CertNexus CFR-310 exam prep with other Community members:

Join the CFR-310 Discussion