Free CFR-410 Exam Braindumps (page: 8)

Page 7 of 26

Malicious code designed to execute in concurrence with a particular event is BEST defined as which of the following?

  1. Logic bomb
  2. Rootkit
  3. Trojan
  4. Backdoor

Answer(s): A


Reference:

https://searchsecurity.techtarget.com/definition/Malware-Glossary



In which of the following attack phases would an attacker use Shodan?

  1. Scanning
  2. Reconnaissance
  3. Gaining access
  4. Persistence

Answer(s): A



During a malware-driven distributed denial of service attack, a security researcher found excessive requests to a name server referring to the same domain name and host name encoded in hexadecimal. The malware author used which type of command and control?

  1. Internet Relay Chat (IRC)
  2. Dnscat2
  3. Custom channel
  4. File Transfer Protocol (FTP)

Answer(s): D


Reference:

https://www.csoonline.com/article/3276660/what-is-shodan-the-search-engine-for- everything-on- the-internet.html



Nmap is a tool most commonly used to:

  1. Map a route for war-driving
  2. Determine who is logged onto a host
  3. Perform network and port scanning
  4. Scan web applications

Answer(s): C


Reference:

https://www.networkworld.com/article/3296740/what-is-nmap-why-you-need-this- network- mapper.html






Post your Comments and Discuss CertNexus CFR-410 exam with other Community members:

CFR-410 Discussions & Posts