Logical Operations CFR-210 Certified CyberSec First Responder CFR Exam Practice Test

Page: 1 / 14
Total 90 questions
Question 1

Which of the following technologies is used as mitigation to XSS attacks?



Answer : C


Question 2

A logfile generated from a Windows server was moved to a Linux system for further analysis. A system administrator is now making edits to the file with vi and notices the file contains numerous instances of Ctrl-M (^M) characters. Which of the following command line tools is the administrator MOST likely to use to remove these characters from the logfile? (Choose two.)



Answer : A, C


Question 3

While reviewing some audit logs, an analyst has identified consistent modification of the sshd_config file for an organization's server. The analyst would like to investigate and compare contents of the current file with archived versions of files that are saved weekly. Which of the following tools will be MOST effective during the investigation?



Answer : B


Question 4

Which of the following commands should be used to print out ONLY the second column of items in the following file?

Source_File,txt

Alpha Whiskey

Bravo Tango

Charlie Foxtrot

Echo Oscar

Delta Roger



Answer : D


Question 5

An incident responder needs to quickly locate specific data in a large data repository. Which of the following Linux tool should be used?



Answer : C


Question 6

Which of the following is the reason that out-of-band communication is used during a security incident?



Answer : C


Question 7

During the course of an investigation, an incident responder discovers illegal material on a user's hard drive. Which of the following is the incident responder's MOST important next step?



Answer : A


Page:    1 / 14   
Total 90 questions