Free CFR-310 Exam Braindumps (page: 4)

Page 3 of 26

An incident responder has collected network capture logs in a text file, separated by five or more data fields. Which of the following is the BEST command to use if the responder would like to print the file (to terminal/screen) in numerical order?

  1. cat | tac
  2. more
  3. sort –n
  4. less

Answer(s): C


Reference:

https://kb.iu.edu/d/afjb



Which of the following characteristics of a web proxy strengthens cybersecurity? (Choose two.)

  1. Increases browsing speed
  2. Filters unwanted content
  3. Limits direct connection to Internet
  4. Caches frequently-visited websites
  5. Decreases wide area network (WAN) traffic

Answer(s): A,D



A cybersecurity expert assigned to be the IT manager of a middle-sized company discovers that there is little endpoint security implementation on the company’s systems. Which of the following could be included in an endpoint security solution? (Choose two.)

  1. Web proxy
  2. Network monitoring system
  3. Data loss prevention (DLP)
  4. Anti-malware
  5. Network Address Translation (NAT)

Answer(s): A,B



During a security investigation, a suspicious Linux laptop is found in the server room. The laptop is processing information and indicating network activity. The investigator is preparing to launch an investigation to determine what is happening with this laptop. Which of the following is the MOST appropriate set of Linux commands that should be executed to conduct the investigation?

  1. iperf, traceroute, whois, ls, chown, cat
  2. iperf, wget, traceroute, dc3dd, ls, whois
  3. lsof, chmod, nano, whois, chown, ls
  4. lsof, ifconfig, who, ps, ls, tcpdump

Answer(s): B






Post your Comments and Discuss CertNexus CFR-310 exam with other Community members:

CFR-310 Discussions & Posts