Free CFR-410 Exam Braindumps (page: 3)

Page 2 of 26

Which of the following is a cybersecurity solution for insider threats to strengthen information protection?

  1. Web proxy
  2. Data loss prevention (DLP)
  3. Anti-malware
  4. Intrusion detection system (IDS)

Answer(s): B


Reference:

https://www.techrepublic.com/article/how-to-protect-your-organization-against-insider- threats/



A security administrator is investigating a compromised host.
Which of the following commands could the investigator use to display executing processes in real time?

  1. ps
  2. top
  3. nice
  4. pstree

Answer(s): B


Reference:

https://www.cyberciti.biz/faq/show-all-running-processes-in-linux/



A system administrator identifies unusual network traffic from outside the local network.
Which of the following is the BEST method for mitigating the threat?

  1. Malware scanning
  2. Port blocking
  3. Packet capturing
  4. Content filtering

Answer(s): C



Which of the following technologies would reduce the risk of a successful SQL injection attack?

  1. Reverse proxy
  2. Web application firewall
  3. Stateful firewall
  4. Web content filtering

Answer(s): B


Reference:

http://www.enterprisenetworkingplanet.com/netsecur/article.php/3866756/10-Ways-to- Prevent-or- Mitigate-SQL-Injection-Attacks.htm






Post your Comments and Discuss CertNexus CFR-410 exam with other Community members:

CFR-410 Discussions & Posts