During which of the following attack phases might a request sent to port 1433 over a whole company network be seen within a log?
Answer(s): B
https://blog.stealthbits.com/finding-microsoft-sql-server-targets-sql-attacks/
An attacker intercepts a hash and compares it to pre-computed hashes to crack a password. Which of the following methods has been used?
Answer(s): C
As part of an organization's regular maintenance activities, a security engineer visits the Internet Storm Center advisory page to obtain the latest list of blacklisted host/network addresses. The security engineer does this to perform which of the following activities?
Answer(s): D
Which of the following, when exposed together, constitutes PII? (Choose two.)
Answer(s): A,C
https://www.lifelock.com/learn-identity-theft-resources-what-is-personally-identifiable- information.html
Post your Comments and Discuss CertNexus CFR-410 exam with other Community members:
Woke Commented on February 23, 2025 Great content Anonymous
Sam Commented on February 23, 2025 Awesome awesome Anonymous
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the CFR-410 content, but please register or login to continue.