Weekend Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Logical Operations CFR-210 Logical Operations CyberSec First Responder Exam Practice Test

Page: 1 / 10
Total 100 questions

Logical Operations CyberSec First Responder Questions and Answers

Question 1

Malicious code that can replicate itself using various techniques is referred to as a:

Options:

A.

downloader

B.

rootkit

C.

launcher

D.

worm

Question 2

An incident responder has captured packets associated with malware. The source port is 8765 and the destination port is 7653. Which of the following commands should be used on the source computer to help determine which program is responsible for the connection?

Options:

A.

services.msc

B.

psexec

C.

msconfig

D.

fport

Question 3

A SOC analyst reviews vendor security bulletins and security blog articles against the company’s deployed system and software base. Based on current attack patterns, three vulnerabilities, including a zero-day vulnerability, have been upgraded to high priority. Which of the following should the SOC analyst recommend? (Choose two.)

Options:

A.

Reboot affected servers

B.

Implement DNS filtering

C.

Update IPS rules

D.

Implement application whitelisting

E.

Patch affected systems

Question 4

An organization needs to determine of any systems on its network (10.0.25.0/24) have web services running on port 80 or 443. Which of the following is the BEST command to do this?

Options:

A.

netstat –p 80-443 10.0.25.0/24

B.

nmap –v 80,443 10.0.25.0/24

C.

netstat –v 80,443 10.0.25.0/24

D.

nmap –p 80,443 10.0.25.0/24

Question 5

An incident responder notices many entries in an apache access log file that contain semicolons. Which of the following attacks is MOST likely being attempted?

Options:

A.

SQL injection

B.

Remote file inclusion

C.

Account brute force

D.

Cross-site scripting

Question 6

A security analyst for a financial services firm is monitoring blogs and reads about a zero-day vulnerability being exploited by a little-known group of hackers. The analyst wishes to independently validate and corroborate the blog’s posting. Whichof the following sources of information will provide the MOST credible supporting threat intelligence in this situation?

Options:

A.

Similar cybersecurity blogs

B.

Threat intelligence sharing groups

C.

Computer emergency response team press release

D.

Internet searches on zero-day exploits

Question 7

An alert has been triggered identifying a new application running on a Windows server. Which of the following tools can be used to identify the application? (Choose two.)

Options:

A.

traceroute

B.

nbstat

C.

Hex editor

D.

Task manager

E.

Process explorer

Question 8

During an annual penetration test, several rootkit-enabled systems are found to be exfiltrating data. The penetration test team and the internal incident response team work to begin cleanup. The company’s operations team offers a new emails server to use for communications during the incident. As cleanup continues, the attackers seem to know exactly what the incident response plan is. Which of the following will prevent the attackers from compromising cleanup activities?

Options:

A.

Check the DNS server for rootkits placed by the attackers.

B.

Disconnect the Internet router until all systems can be checked and cleaned.

C.

Use out-of-band communication until the end of the incident.

D.

Disconnect the old emails server until they can be checked and cleaned.

Question 9

A security professional has been tasked with the protection of a specific set of information essential to a corporation’s livelihood, the exposure of which could cost the company billions of dollars in long-term revenue. The professional is interested in obtaining advice for preventing the theft of this type of information. Which of the following is the BEST resource for finding this material?

Options:

A.

Law enforcement information sharing groups

B.

National Threat Assessment Center

C.

Vendor web pages that provide intelligence feeds and advisories

D.

Blogs concerning the theft of PII

Question 10

A DMZ web server has been compromised. During the log review, the incident responder wants to parse all common internal Class A addresses from the log. Which of the following commands should the responder use to accomplish this?

Options:

A.

grep –x”(10.[0-9]+.[0-9]+.[0-9]+)” etc/rc.d/apache2/access.log | output.txt

B.

grep –x”(192.168.[0.9]+[0-9])” bin/apache2/access.log | output.txt

C.

grep –v”(10.[0-9]+.[0-9]+.[0-9]+)” /var/log/apache2/access.log > output.txt

D.

grep –v”(192.168.[0.9]+[0-9]+)” /var/log/apache2/access.log > output.txt

Question 11

Which of the following commands should be used to print out ONLY the second column of items in the following file?

Source_File,txt

Alpha Whiskey

Bravo Tango

Charlie Foxtrot

Echo Oscar

Delta Roger

Options:

A.

cut –d “ “ –f2 source_file.txt

B.

cut –b7-15 source_file.txt

C.

cut –d “ “ –f2 Source_File.txt

D.

cut –c6-12 Source_File.txt

Question 12

An organization’s public information website has been defaced. The incident response team is actively engaged in the following actions:

- Installing patches on the web server

- Turning off unnecessary services on web server

- Adding new ACL rules to the WAF

- Changing all passwords on web server accounts

Which of the following incident response phases is the team MOST likely conducting?

Options:

A.

Respond

B.

Recover

C.

Contain

D.

Identify

Question 13

An attacker performs reconnaissance on a Chief Executive Officer (CEO) using publicity available resources to gain access to the CEO’s office. The attacker was in the CEO’s office for less than five minutes, and the attack left no traces in any logs, nor was there any readily identifiable cause for the exploit. The attacker in then able to use numerous credentials belonging to the CEO to conduct a variety of further attacks. Which of the following types of exploit is described?

Options:

A.

Pivoting

B.

Malicious linking

C.

Whaling

D.

Keylogging

Question 14

Which of the following protocols can be used for data extension?

Options:

A.

SNMP

B.

DNS

C.

ARP

D.

DHCP

Question 15

An intruder gains physical access to a company’s headquarters. The intruder is able to access the company’s network via a visitor’s office. The intruder sets up an attack device, under the visitor’s office desk, that impersonates the corporate wireless network. Users at headquarters begin to notice slow browsing speeds from their company laptops. Which of the following attacks is MOST likely occurring?

Options:

A.

Man-in-the-middle

B.

Denial of service

C.

Social engineering

D.

ARP table poisoning

Page: 1 / 10
Total 100 questions