Free CFR-310 Exam Braindumps (page: 5)

Page 4 of 26

A security analyst is required to collect detailed network traffic on a virtual machine. Which of the following tools could the analyst use?

  1. nbtstat
  2. WinDump
  3. fport
  4. netstat

Answer(s): D



After a security breach, a security consultant is hired to perform a vulnerability assessment for a company’s web application. Which of the following tools would the consultant use?

  1. Nikto
  2. Kismet
  3. tcpdump
  4. Hydra

Answer(s): A


Reference:

https://www.scnsoft.com/blog/network-vulnerability-assessment-guide



When performing an investigation, a security analyst needs to extract information from text files in a Windows operating system. Which of the following commands should the security analyst use?

  1. findstr
  2. grep
  3. awk
  4. sigverif

Answer(s): C


Reference:

https://books.google.com.pk/books?id=8qTxCAAAQBAJ&pg=PA6&lpg=PA6&dq=awk+extract+information+from+text+files+in+a+Windows+operating+system&source=bl&ots=mm7bH69viV&sig=ACfU3U2sg2lNmZXZW0FKQWctyfH89yAz3Q&hl=en&sa=X&ved=2ahUKEwiFioWCgbbpAhVFQBoKHavGAcUQ6AEwAHoECBQQAQ#v=onepage&q=awk%20extract%20information%20from%20text%20files%20in%20a%20Windows%20operating%20system&f=false



Which of the following does the command nmap –open 10.10.10.3 do?

  1. Execute a scan on a single host, returning only open ports.
  2. Execute a scan on a subnet, returning detailed information on open ports.
  3. Execute a scan on a subnet, returning all hosts with open ports.
  4. Execute a scan on a single host, returning open services.

Answer(s): D






Post your Comments and Discuss CertNexus CFR-310 exam with other Community members:

CFR-310 Discussions & Posts