CFR-210 無料問題集「Logical Operations CyberSec First Responder」

A SOC analyst has been tasked with checking all files in every employee home directory for any mention
of a new product code named PitViper. Which of the following commands will return all requested data?

Which of the following technologies is used as mitigation to XSS attacks?

A forensics investigator has been assigned the task of investigating a system user for suspicion of using a
company-owned workstation to view unauthorized content. Which of the following would be a proper
course of action for the investigator to take?

DRAG DROP
When perpetrating an attack, there are often a number of phases attackers will undertake, sometimes
taking place over a long period of time. Place the following phases in the correct chronological order from
first (1) to last (5).
正解:
An incident responder is investigating a Linux server reported to be "behaving strangely". Which of the
following commands should the incident responder use to identify any users currently logged into the
system? (Choose two.)

An alert has been triggered identifying a new application running on a Windows server. Which of the
following tools can be used to identify the application? (Choose two.)

正解:B、D 解答を投票する
Which of the following are reasons that a hacker would execute a DoS or a DDoS attack? (Choose two.)

正解:A、D 解答を投票する
A malicious actor sends a crafted email to the office manager using personal information collected from
social media. This type of social engineering attack is known as:

DRAG DROP
Drag and drop the following steps in the correct order from first (1) to last (7) that a forensic expert would
follow based on data analysis in a Windows system.
正解:
During a malware outbreak, a security analyst has been asked to capture network traffic in hourly
increments for analysis by the incident response team . Which of the following tcpdump commands would
generate hourly pcap files?

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡