Free CFR-410 Exam Braindumps (page: 13)

Page 12 of 26

Which of the following methods are used by attackers to find new ransomware victims? (Choose two.)

  1. Web crawling
  2. Distributed denial of service (DDoS) attack
  3. Password guessing
  4. Phishing
  5. Brute force attack

Answer(s): D,E


Reference:

https://www.itproportal.com/features/the-four-most-popular-methods-hackers-use-to- spread- ransomware/



After a hacker obtained a shell on a Linux box, the hacker then sends the exfiltrated data via Domain Name System (DNS). This is an example of which type of data exfiltration?

  1. Covert channels
  2. File sharing services
  3. Steganography
  4. Rogue service

Answer(s): A



According to company policy, all accounts with administrator privileges should have suffix _j

  1. While reviewing Windows workstation configurations, a security administrator discovers an account without the suffix in the administrator's group.
    Which of the following actions should the security administrator take?
  2. Review the system log on the affected workstation.
  3. Review the security log on a domain controller.
  4. Review the system log on a domain controller.
  5. Review the security log on the affected workstation.

Answer(s): B



A security engineer is setting up security information and event management (SIEM).
Which of the following log sources should the engineer include that will contain indicators of a possible web server compromise? (Choose two.)

  1. NetFlow logs
  2. Web server logs
  3. Domain controller logs
  4. Proxy logs
  5. FTP logs

Answer(s): B,C


Reference:

https://www.techrepublic.com/blog/data-center/top-three-indicators-of-compromised- web-servers/






Post your Comments and Discuss CertNexus CFR-410 exam with other Community members:

CFR-410 Discussions & Posts