Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
sale

Want to Unlock All Questions for this Exam?

Full Exam Access, Discussions, No Robots Checks

CertNexus CFR-310 Exam Actual Questions

The questions for CFR-310 were last updated on April 19, 2024.
  • Viewing page 1 out of 25 pages.
  • Viewing questions 1-4 out of 100 questions

Topic 1 - Exam A

Question #1 Topic 1

A network security analyst has noticed a flood of Simple Mail Transfer Protocol (SMTP) traffic to internal clients. SMTP traffic should only be allowed to email servers. Which of the following commands would stop this attack? (Choose two.)

  • A. iptables -A INPUT -p tcp –dport 25 -d x.x.x.x -j ACCEPT
  • B. iptables -A INPUT -p tcp –sport 25 -d x.x.x.x -j ACCEPT
  • C. iptables -A INPUT -p tcp –dport 25 -j DROP
  • D. iptables -A INPUT -p tcp –destination-port 21 -j DROP
  • E. iptables -A FORWARD -p tcp –dport 6881:6889 -j DROP
Reveal Solution Hide Solution   Discussion   2

Correct Answer: AC 🗳️

Question #2 Topic 1

A secretary receives an email from a friend with a picture of a kitten in it. The secretary forwards it to the ~COMPANYWIDE mailing list and, shortly thereafter, users across the company receive the following message:
“You seem tense. Take a deep breath and relax!”
The incident response team is activated and opens the picture in a virtual machine to test it. After a short analysis, the following code is found in C:
\Temp\chill.exe:Powershell.exe –Command “do {(for /L %i in (2,1,254) do shutdown /r /m Error! Hyperlink reference not valid.> /f /t / 0 (/c “You seem tense. Take a deep breath and relax!”);Start-Sleep –s 900) } while(1)”
Which of the following BEST represents what the attacker was trying to accomplish?

  • A. Taunt the user and then trigger a shutdown every 15 minutes.
  • B. Taunt the user and then trigger a reboot every 15 minutes.
  • C. Taunt the user and then trigger a shutdown every 900 minutes.
  • D. Taunt the user and then trigger a reboot every 900 minutes.
Reveal Solution Hide Solution   Discussion   2

Correct Answer: B 🗳️

Question #3 Topic 1

A Linux system administrator found suspicious activity on host IP 192.168.10.121. This host is also establishing a connection to IP 88.143.12.123. Which of the following commands should the administrator use to capture only the traffic between the two hosts?

  • A. # tcpdump -i eth0 host 88.143.12.123
  • B. # tcpdump -i eth0 dst 88.143.12.123
  • C. # tcpdump -i eth0 host 192.168.10.121
  • D. # tcpdump -i eth0 src 88.143.12.123
Reveal Solution Hide Solution   Discussion   2

Correct Answer: B 🗳️

Question #4 Topic 1

After imaging a disk as part of an investigation, a forensics analyst wants to hash the image using a tool that supports piecewise hashing. Which of the following tools should the analyst use?

  • A. md5sum
  • B. sha256sum
  • C. md5deep
  • D. hashdeep
Reveal Solution Hide Solution   Discussion   2

Correct Answer: A 🗳️

Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...