CFR-310 Dumps CFR-310 Braindumps CFR-310 Real Questions CFR-310 Practice Test CFR-310 dumps free CertNexus CFR-310 CyberSec First Responder http://killexams.com/pass4sure/exam-detail/CFR-310 QUESTION 92 Which of the following are part of the hardening phase of the vulnerability assessment process? (Choose two.) A. Installing patches B. Updating configurations C. Documenting exceptions D. Conducting audits E. Generating reports Correct Answer: AB QUESTION 93 To minimize vulnerability, which steps should an organization take before deploying a new Internet of Things (IoT) device? (Choose two.) A. Changing the default password B. Updating the device firmware C. Setting up new users D. Disabling IPv6 E. Enabling the firewall Correct Answer: BE QUESTION 94 The Key Reinstallation Attack (KRACK) vulnerability is specific to which types of devices? (Choose two.) A. Wireless router B. Switch C. Firewall D. Access point E. Hub Correct Answer: AE Reference: https://www.kaspersky.com/blog/krackattack/19798/ QUESTION 95 While planning a vulnerability assessment on a computer network, which of the following is essential? (Choose two.) A. Identifying exposures B. Identifying critical assets C. Establishing scope D. Running scanning tools E. Installing antivirus software Correct Answer: AC QUESTION 96 Which of the following attacks involves sending a large amount of spoofed User Datagram Protocol (UDP) traffic to a router’s broadcast address within a network? A. Land attack B. Fraggle attack C. Smurf attack D. Teardrop attack Correct Answer: C Reference: https://books.google.com.pk/books?id=rCx5OfSFUPkC&pg=RA7-PA8&lpg=RA7-PA8&dq=attacks+involves+sending+a+large+amount+of+spoofed+User+Datagram+Protocol+(UDP)+traffic+to+a+router%E2%80%99s+broadcast +address+within+a+network&source=bl&ots=aKV7j5UIQx&sig=ACfU3U0EkAK3nHXfUCJco5xVhckbtrT68w&hl=en&sa=X&ved=2ahUKEwjMlPWLz7bpAhUBrxoKHQNyAVoQ6AEwAHoECBUQAQ#v=onepage&q=attacks%20involves% 20sending%20a%20large%20amount%20of%20spoofed%20User%20Datagram%20Protocol%20(UDP)%20traffic%20to%20a%20router%E2%80%99s%20broadcast%20address%20within%20a%20network&f=false QUESTION 97 An automatic vulnerability scan has been performed. Which is the next step of the vulnerability assessment process? A. Hardening the infrastructure B. Documenting exceptions C. Assessing identified exposures D. Generating reports Correct Answer: D Reference: https://securityintelligence.com/a-step-by-step-guide-to-vulnerability-assessment/ QUESTION 98 An organization recently suffered a data breach involving a server that had Transmission Control Protocol (TCP) port 1433 inadvertently exposed to the Internet. Which of the following services was vulnerable? A. Internet Message Access Protocol (IMAP) B. Network Basic Input/Output System (NetBIOS) C. Database D. Network Time Protocol (NTP) Correct Answer: C Reference: http://www.princeton.edu/~rblee/ELE572Papers/Fall04Readings/DDoSSurveyPaper_20030516_Final.pdf (9) QUESTION 99 Which of the following are common areas of vulnerabilities in a network switch? (Choose two.) A. Default port state B. Default credentials C. Default protocols D. Default encryption E. Default IP address Correct Answer: AB QUESTION 100 Which of the following is susceptible to a cache poisoning attack? A. Domain Name System (DNS) B. Secure Shell (SSH) C. Hypertext Transfer Protocol Secure (HTTPS) D. Hypertext Transfer Protocol (HTTP) Correct Answer: A Section: (none) Reference: https://www.sciencedirect.com/topics/computer-science/cache-poisoning-attack For More exams visit https://killexams.com/vendors-exam-list Kill your exam at First Attempt....Guaranteed!