CertNexus CFR 410
Q: 1
A security operations center (SOC) analyst observed an unusually high number of login failures on a
particular database server. The analyst wants to gather supporting evidence before escalating the
observation to management. Which of the following expressions will provide login failure data for
11/24/2015?
Options
Q: 2
An administrator investigating intermittent network communication problems has identified an
excessive amount of traffic from an external-facing host to an unknown location on the Internet.
Which of the following
BEST describes what is occurring?
Options
Q: 3
While performing routing maintenance on a Windows Server, a technician notices several
unapproved Windows Updates and that remote access software has been installed. The technician
suspects that a malicious actor has gained access to the system. Which of the following steps in the
attack process does this activity indicate?
Options
Q: 4
What are three examples of incident response? (Choose three.)
Options
Q: 5
Which of the following types of attackers would be MOST likely to use multiple zero-day exploits
executed against high-value, well-defended targets for the purposes of espionage and sabotage?
Options
Q: 6
When attempting to determine which system or user is generating excessive web traffic, analysis of
which of
the following would provide the BEST results?
Options
Q: 7
A system administrator has been tasked with developing highly detailed instructions for patching
managed assets using the corporate patch management solution. These instructions are an example
of which of the following?
Options
Q: 8
A suspicious script was found on a sensitive research system. Subsequent analysis determined that
proprietary data would have been deleted from both the local server and backup media immediately
following a specific administrator’s removal from an employee list that is refreshed each evening.
Which of the following BEST describes this scenario?
Options
Q: 9
Which common source of vulnerability should be addressed to BEST mitigate against URL redirection
attacks?
Options
Q: 10
Which three answer options are password attack methods and techniques? (Choose three.)
Options
Question 1 of 10