Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

CFR-210 Logical Operations CyberSec First Responder Questions and Answers

Questions 4

During the identification phase, it is discovered that port 23 is being used maliciously. Which of the following system hardening techniques should be used to remediate the issue?

Options:

A.

Disable unnecessary services

B.

Patch the system

C.

Configure blackhole routing

D.

Configure DNS filtering

Buy Now
Questions 5

Which of the following technologies is used as mitigation to XSS attacks?

Options:

A.

Intrusion prevention

B.

Proxy filtering

C.

Web application firewall

D.

Intrusion detection

Buy Now
Questions 6

Which of the following is the reason that out-of-band communication is used during a security incident?

Options:

A.

The SMTP server may be compromised.

B.

The incident response systems may be busy.

C.

Other communication methods are unreliable.

D.

An attacker could be monitoring network traffic.

Buy Now
Questions 7

Drag and drop the following steps to perform a successful social engineering attack in the correct order, from first (1) to last (6).

CFR-210 Question 7

Options:

Buy Now
Questions 8

A security professional has been tasked with the protection of a specific set of information essential to a corporation’s livelihood, the exposure of which could cost the company billions of dollars in long-term revenue. The professional is interested in obtaining advice for preventing the theft of this type of information. Which of the following is the BEST resource for finding this material?

Options:

A.

Law enforcement information sharing groups

B.

National Threat Assessment Center

C.

Vendor web pages that provide intelligence feeds and advisories

D.

Blogs concerning the theft of PII

Buy Now
Questions 9

While reviewing some audit logs, an analyst has identified consistent modification of the sshd_config file for an organization’s server. The analyst would like to investigate and compare contents of the current file with archived versions of files that are saved weekly. Which of the following tools will be MOST effective during the investigation?

Options:

A.

cat < beginning of filename > * | cut –d ‘,’ –f 2,5,7

B.

more < beginning of filename > * | grep < string of characters >

C.

diff < filename > < filename 2 >

D.

sort < beginning of filename > *

Buy Now
Questions 10

A security analyst would like to parse through several SQL logs for indicators of compromise. The analyst is aware that none of the fields should contain a string of text longer than 30 characters; however, the analyst is unaware if there are any implemented controls to prevent such an overflow. Which of the following BEST describes the regular expression the analyst should use to find any alphanumeric character string?

Options:

A.

/^[a-zA-Z0-9]{5,30}$/

B.

/^[a-zA-Z-9]{30}$/

C.

/^[a-zA-Z]{5,30}$/

D.

/^[a-Z0-9]{5,30}$/

Buy Now
Questions 11

A forensics analyst is analyzing an executable and thinks it may have some text of interest hidden within it. Which of the following tools can the analyst use to assist in validating the suspicion?

Options:

A.

Isof

B.

cat command

C.

hex editor

D.

more

Buy Now
Questions 12

A hacker’s end goal is to target the Chief Financial Officer (CFO) of a bank. Which of the following describes this social engineering tactic?

Options:

A.

Vishing

B.

Pharming

C.

Spear phishing

D.

Whaling

Buy Now
Questions 13

An attacker has exfiltrated the SAM file from a Windows workstation. Which of the following attacks is MOST likely being perpetrated?

Options:

A.

user enumeration

B.

Brute forcing

C.

Password sniffing

D.

Hijacking/rooting

Buy Now
Questions 14

An attacker has decided to attempt a brute force attack on a UNIX server. In order to accomplish this, which of the following steps must be performed?

Options:

A.

Exfiltrate the shadow and SAM, run unshadow, and then runa password cracking utility on the output file.

B.

Exfiltrate the shadow and passwd, and then run a password cracking utility on both files.

C.

Exfiltrate the shadow and SAM, and then run a password cracking utility on both files.

D.

Exfiltrate the shadowand passwd, run unshadow, and then run a password cracking utility on the output file.

Buy Now
Questions 15

Click the exhibit button. Which of the following Windows tools is executed?

CFR-210 Question 15

Options:

A.

nmap

B.

netstat

C.

tracert

D.

traceroute

Buy Now
Questions 16

An outside organization has reported to the Chief Information Officer (CIO) of a company that it has received attack from a Linux system in the company’s DMZ. Which of the following commands should an incident responder use to review a list of currently running programs on the potentially compromised system?

Options:

A.

task manager

B.

tlist

C.

who

D.

top

Buy Now
Questions 17

A malicious attacker has compromised a database by implementing a Python-based script that will automatically establish an SSH connection daily between the hours of 2:00 am and 5:00 am. Which of the following is the MOST common motive for the attack vector that was used?

Options:

A.

Pivoting

B.

Persistence/maintaining access

C.

Exfiltration

D.

Lateral movement

Buy Now
Questions 18

Which of the following describes pivoting?

Options:

A.

Copying captured data to a hacker’s system

B.

Performing IP packet inspection

C.

Generating excessive network traffic

D.

Accessing another system from a compromised system

Buy Now
Questions 19

An incident responder suspects that a host behind a firewall is infected with malware. Which of the following should the responder use to find the IP address of the infected machine?

Options:

A.

NAT table

B.

ARP cache

C.

DNS cache

D.

CAM cable

Buy Now
Questions 20

A SOC analyst reviews vendor security bulletins and security blog articles against the company’s deployed system and software base. Based on current attack patterns, three vulnerabilities, including a zero-day vulnerability, have been upgraded to high priority. Which of the following should the SOC analyst recommend? (Choose two.)

Options:

A.

Reboot affected servers

B.

Implement DNS filtering

C.

Update IPS rules

D.

Implement application whitelisting

E.

Patch affected systems

Buy Now
Questions 21

An analyst would like to search for a specific text string at the beginning of a line that begins with four capital alphabetic characters. Which of the following search operators should be used?

Options:

A.

/\b\w{4}\b

B.

/\b[A-Z]{4}\g

C.

/^\w{4}\b

D.

/B[A-Z]{4}\b\g

Buy Now
Questions 22

Organizations should exercise their Incident Response (IR) plan following initial creation. The primary objective for this first IR plan exercise is to identify:

Options:

A.

deficiencies in cyber security incident response team skills.

B.

gaps or overlaps in supporting processes and procedures.

C.

critical steps required in the case of an incident.

D.

capabilities required to improve response time.

Buy Now
Questions 23

An incident responder is investigating a Linux server reported to be “behaving strangely”. Which of the following commands should the incident responder use to identify any users currently logged into the system? (Choose two.)

Options:

A.

Isof

B.

Is

C.

id

D.

w

E.

lastlog

Buy Now
Questions 24

Which of the following is an automated password cracking technique that uses a combination of upper and lower case letters, 0-9 numbers, and special characters?

Options:

A.

Dictionary attack

B.

Password guessing

C.

Brute force attack

D.

Rainbow tables

Buy Now
Questions 25

Which of the following enables security personnel to have the BEST security incident recovery practices?

Options:

A.

Crisis communication plan

B.

Disaster recovery plan

C.

Occupant emergency plan

D.

Cyber incident response plan

Buy Now
Questions 26

While a network administrator is monitoring the company network, an unknown local IP address is starting to release high volumes of anonymous traffic to an unknown external IP address. Which of the following would indicate to the network administrator potential compromise?

Options:

A.

Packet losses

B.

Excessive bandwidth usage

C.

Service disruption

D.

Off-hours usage

Buy Now
Questions 27

During a malware outbreak, a security analyst has been asked to capture network traffic in hourly increments for analysis by the incident response team. Which of the following tcpdump commands would generate hourly pcap files?

Options:

A.

tcpdump –nn –i eth0 –w output.pcap –C 100 –W 10

B.

tcpdump –nn –i eth0 –w output.pcap –W 24

C.

tcpdump –nn –i eth0 –w output.pcap –G 3600 –W 14

D.

tcpdump –nn –i eth0 –w output.pcap

Buy Now
Questions 28

During an annual penetration test, several rootkit-enabled systems are found to be exfiltrating data. The penetration test team and the internal incident response team work to begin cleanup. The company’s operations team offers a new emails server to use for communications during the incident. As cleanup continues, the attackers seem to know exactly what the incident response plan is. Which of the following will prevent the attackers from compromising cleanup activities?

Options:

A.

Check the DNS server for rootkits placed by the attackers.

B.

Disconnect the Internet router until all systems can be checked and cleaned.

C.

Use out-of-band communication until the end of the incident.

D.

Disconnect the old emails server until they can be checked and cleaned.

Buy Now
Questions 29

A malicious actor sends a crafted email to the office manager using personal information collected from social media. This type of social engineering attack is known as:

Options:

A.

spear phishing

B.

vishing

C.

phishing

D.

whaling

Buy Now
Questions 30

Which of the following can hackers use to gain access to a system over the network without knowing the actual password?

Options:

A.

User enumeration

B.

Pass the hash

C.

Port scanning

D.

Password cracking

Buy Now
Exam Code: CFR-210
Exam Name: Logical Operations CyberSec First Responder
Last Update: Apr 30, 2026
Questions: 100

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now CFR-210 testing engine

PDF (Q&A)

$43.57  $124.49
buy now CFR-210 pdf