Practice Logical Operations CFR-210 Exam Questions
Page: 1/18 Total 90 Questions
Question No 1
An attacker performs reconnaissance on a Chief Executive Officer (CEO) using publicity available
resources to gain access to the CEO’s office. The attacker was in the CEO’s office for less than five
minutes, and the attack left no traces in any logs, nor was there any readily identifiable cause for the
exploit. The attacker in then able to use numerous credentials belonging to the CEO to conduct a
variety of further attacks. Which of the following types of exploit is described?
Question No 2
Which of the following is an automated password cracking technique that uses a combination of
upper and lower case letters, 0 - 9 numbers, and special characters?
Question No 3
A zero - day vulnerability is discovered on a company’s network. The security analyst conducts a log
review, schedules an immediate vulnerability scan, and quarantines the infected system, but cannot
determine the root cause of the vulnerability. Which of the following is a source of information that
can be used to identify the cause of the vulnerability?
Question No 4
The Chief Information Officer (CIO) of a company asks the incident responder to update the risk
management plan. Which of the following methods can BEST help the incident responder identify
the risks that require in - depth analysis?
Question No 5
A security analyst for a financial services firm is monitoring blogs and reads about a zero - day
vulnerability being exploited by a little - known group of hackers. The analyst wishes to independently
validate and corroborate the blog’s posting. Whichof the following sources of information will
provide the MOST credible supporting threat intelligence in this situation?