Exam Code : CFR-310
Exam Name : CyberSec First Responder
Vendor Name :
"CertNexus"
CFR-310 Dumps CFR-310 Braindumps
CFR-310 Real Questions CFR-310 Practice Test CFR-310 Actual Questions
killexams.com CertNexus CFR-310
CyberSec First Responder
https://killexams.com/pass4sure/exam-detail/CFR-310
Which of the following are part of the hardening phase of the vulnerability assessment process? (Choose two.)
Installing patches
Updating configurations
Documenting exceptions
Conducting audits
Generating reports
Changing the default password
Updating the device firmware
Setting up new users
Disabling IPv6
Enabling the firewall
Wireless router
Switch
Firewall
Access point
Hub
Reference: https://www.kaspersky.com/blog/krackattack/19798/
Identifying exposures
Identifying critical assets
Establishing scope
Running scanning tools
Installing antivirus software
Land attack
Fraggle attack
Smurf attack
Teardrop attack
Reference: https://books.google.com.pk/books?id=rCx5OfSFUPkC&pg=RA7-PA8&lpg=RA7-PA8&dq=attacks+involves+sending+a+large+amount+of+spoofed+User+Datagram+Protocol+(UDP)+traffic+to+a+router%E2%80%99s+broadcast
+address+within+a+network&source=bl&ots=aKV7j5UIQx&sig=ACfU3U0EkAK3nHXfUCJco5xVhckbtrT68w&hl=en&sa=X&ved=2ahUKEwjMlPWLz7bpAhUBrxoKHQNyAVoQ6AEwAHoECBUQAQ#v=onepage&q=attacks%20involves% 20sending%20a%20large%20amount%20of%20spoofed%20User%20Datagram%20Protocol%20(UDP)%20traffic%20to%20a%20router%E2%80%99s%20broadcast%20address%20within%20a%20network&f=false
An automatic vulnerability scan has been performed. Which is the next step of the vulnerability assessment process?
Hardening the infrastructure
Documenting exceptions
Assessing identified exposures
Generating reports
Reference: https://securityintelligence.com/a-step-by-step-guide-to-vulnerability-assessment/
Internet Message Access Protocol (IMAP)
Network Basic Input/Output System (NetBIOS)
Database
Network Time Protocol (NTP)
Reference: https://www.princeton.edu/~rblee/ELE572Papers/Fall04Readings/DDoSSurveyPaper_20030516_Final.pd(f9)
Default port state
Default credentials
Default protocols
Default encryption
Default IP address
Domain Name System (DNS)
Secure Shell (SSH)
Hypertext Transfer Protocol Secure (HTTPS)
Hypertext Transfer Protocol (HTTP)
Reference: https://www.sciencedirect.com/topics/computer-science/cache-poisoning-attack