Free CFR-310 Exam Braindumps (page: 9)

Page 8 of 26

A suspicious script was found on a sensitive research system. Subsequent analysis determined that proprietary data would have been deleted from both the local server and backup media immediately following a specific administrator’s removal from an employee list that is refreshed each evening. Which of the following BEST describes this scenario?

  1. Backdoor
  2. Rootkit
  3. Time bomb
  4. Logic bomb

Answer(s): A



A user receives an email about an unfamiliar bank transaction, which includes a link. When clicked, the link redirects the user to a web page that looks exactly like their bank’s website and asks them to log in with their username and password. Which type of attack is this?

  1. Whaling
  2. Smishing
  3. Vishing
  4. Phishing

Answer(s): D


Reference:

https://www.phishing.org/what-is-phishing



A company has noticed a trend of attackers gaining access to corporate mailboxes. Which of the following would be the BEST action to take to plan for this kind of attack in the future?

  1. Scanning email server for vulnerabilities
  2. Conducting security awareness training
  3. Hardening the Microsoft Exchange Server
  4. Auditing account password complexity

Answer(s): A



If a hacker is attempting to alter or delete system audit logs, in which of the following attack phases is the hacker involved?

  1. Covering tracks
  2. Expanding access
  3. Gaining persistence
  4. Performing reconnaissance

Answer(s): A


Reference:

https://resources.infosecinstitute.com/category/certifications-training/ethical-hacking/covering-tracks/log-tampering-101/#gref






Post your Comments and Discuss CertNexus CFR-310 exam with other Community members:

CFR-310 Discussions & Posts