CFR-410試験無料問題集「CertNexus CyberSec First Responder 認定」

The incident response team has completed root cause analysis for an incident. Which of the following actions should be taken in the next phase of the incident response process? (Choose two.)

Which of the following, when exposed together, constitutes PII? (Choose two.)

A security administrator is investigating a compromised host. Which of the following commands could the investigator use to display executing processes in real time?

If a hacker is attempting to alter or delete system audit logs, in which of the following attack phases is the hacker involved?

An organization recently suffered a data breach involving a server that had Transmission Control Protocol (TCP) port 1433 inadvertently exposed to the Internet. Which of the following services was vulnerable?

A security operations center (SOC) analyst observed an unusually high number of login failures on a particular database server. The analyst wants to gather supporting evidence before escalating the observation to management. Which of the following expressions will provide login failure data for 11/24/2015?

Which of the following are part of the hardening phase of the vulnerability assessment process? (Choose two.)

A company has noticed a trend of attackers gaining access to corporate mailboxes. Which of the following would be the BEST action to take to plan for this kind of attack in the future?

A company website was hacked via the following SQL query:
email, passwd, login_id, full_name FROM members
WHERE email = "[email protected]"; DROP TABLE members; -"
Which of the following did the hackers perform?

A system administrator identifies unusual network traffic from outside the local network. Which of the following is the BEST method for mitigating the threat?