Free CFR-410 Exam Braindumps (page: 5)

Page 4 of 26

A security analyst is required to collect detailed network traffic on a virtual machine.
Which of the following tools could the analyst use?

  1. nbtstat
  2. WinDump
  3. fport
  4. netstat

Answer(s): D



After a security breach, a security consultant is hired to perform a vulnerability assessment for a company's web application.
Which of the following tools would the consultant use?

  1. Nikto
  2. Kismet
  3. tcpdump
  4. Hydra

Answer(s): A


Reference:

https://www.scnsoft.com/blog/network-vulnerability-assessment-guide



When performing an investigation, a security analyst needs to extract information from text files in a Windows operating system.
Which of the following commands should the security analyst use?

  1. findstr
  2. grep
  3. awk
  4. sigverif

Answer(s): C



Which of the following does the command nmap ­open 10.10.10.3 do?

  1. Execute a scan on a single host, returning only open ports.
  2. Execute a scan on a subnet, returning detailed information on open ports.
  3. Execute a scan on a subnet, returning all hosts with open ports.
  4. Execute a scan on a single host, returning open services.

Answer(s): D






Post your Comments and Discuss CertNexus CFR-410 exam with other Community members:

CFR-410 Discussions & Posts