CertNexus cfr-310 practice test

CyberSec First Responder Exam


Question 1

Which of the following is susceptible to a cache poisoning attack?

  • A. Domain Name System (DNS)
  • B. Secure Shell (SSH)
  • C. Hypertext Transfer Protocol Secure (HTTPS)
  • D. Hypertext Transfer Protocol (HTTP)
Answer:

A

Discussions

Question 2

Which of the following are common areas of vulnerabilities in a network switch? (Choose two.)

  • A. Default port state
  • B. Default credentials
  • C. Default protocols
  • D. Default encryption
  • E. Default IP address
Answer:

AB

Discussions

Question 3

An organization recently suffered a data breach involving a server that had Transmission Control
Protocol (TCP) port 1433 inadvertently exposed to the Internet. Which of the following services was
vulnerable?

  • A. Internet Message Access Protocol (IMAP)
  • B. Network Basic Input/Output System (NetBIOS)
  • C. Database
  • D. Network Time Protocol (NTP)
Answer:

C

Reference:
http://www.princeton.edu/~rblee/ELE572Papers/Fall04Readings/
DDoSSurveyPaper_20030516_Final.pdf (9)

Discussions

Question 4

An automatic vulnerability scan has been performed. Which is the next step of the vulnerability
assessment process?

  • A. Hardening the infrastructure
  • B. Documenting exceptions
  • C. Assessing identified exposures
  • D. Generating reports
Answer:

D

Reference:
https://securityintelligence.com/a-step-by-step-guide-to-vulnerability-assessment/

Discussions

Question 5

Which of the following attacks involves sending a large amount of spoofed User Datagram Protocol
(UDP) traffic to a routers broadcast address within a network?

  • A. Land attack
  • B. Fraggle attack
  • C. Smurf attack
  • D. Teardrop attack
Answer:

C

Discussions

Question 6

While planning a vulnerability assessment on a computer network, which of the following is
essential? (Choose two.)

  • A. Identifying exposures
  • B. Identifying critical assets
  • C. Establishing scope
  • D. Running scanning tools
  • E. Installing antivirus software
Answer:

AC

Discussions

Question 7

The Key Reinstallation Attack (KRACK) vulnerability is specific to which types of devices? (Choose
two.)

  • A. Wireless router
  • B. Switch
  • C. Firewall
  • D. Access point
  • E. Hub
Answer:

AE

Reference:
https://www.kaspersky.com/blog/krackattack/19798/

Discussions

Question 8

To minimize vulnerability, which steps should an organization take before deploying a new Internet
of Things (IoT) device? (Choose two.)

  • A. Changing the default password
  • B. Updating the device firmware
  • C. Setting up new users
  • D. Disabling IPv6
  • E. Enabling the firewall
Answer:

BE

Discussions

Question 9

Which of the following are part of the hardening phase of the vulnerability assessment process?
(Choose two.)

  • A. Installing patches
  • B. Updating configurations
  • C. Documenting exceptions
  • D. Conducting audits
  • E. Generating reports
Answer:

AB

Discussions

Question 10

Which of the following would MOST likely make a Windows workstation on a corporate network
vulnerable to remote exploitation?

  • A. Disabling Windows Updates
  • B. Disabling Windows Firewall
  • C. Enabling Remote Registry
  • D. Enabling Remote Desktop
Answer:

D

Discussions
To page 2