Which of the following methods are used by attackers to find new ransomware victims? (Choose two.)
Answer(s): D,E
https://www.itproportal.com/features/the-four-most-popular-methods-hackers-use-to- spread- ransomware/
After a hacker obtained a shell on a Linux box, the hacker then sends the exfiltrated data via Domain Name System (DNS). This is an example of which type of data exfiltration?
Answer(s): A
According to company policy, all accounts with administrator privileges should have suffix _j
Answer(s): B
A security engineer is setting up security information and event management (SIEM). Which of the following log sources should the engineer include that will contain indicators of a possible web server compromise? (Choose two.)
Answer(s): B,C
https://www.techrepublic.com/blog/data-center/top-three-indicators-of-compromised- web-servers/
Post your Comments and Discuss CertNexus CFR-410 exam with other Community members:
Woke Commented on February 23, 2025 Great content Anonymous
Sam Commented on February 23, 2025 Awesome awesome Anonymous
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the CFR-410 content, but please register or login to continue.