CFR-310 Exam Question 41
A Linux administrator is trying to determine the character count on many log files. Which of the following command and flag combinations should the administrator use?
CFR-310 Exam Question 42
After a security breach, a security consultant is hired to perform a vulnerability assessment for a company's web application. Which of the following tools would the consultant use?
CFR-310 Exam Question 43
It was recently discovered that many of an organization's servers were running unauthorized cryptocurrency mining software. Which of the following assets were being targeted in this attack? (Choose two.)
CFR-310 Exam Question 44
Which of the following types of attackers would be MOST likely to use multiple zero-day exploits executed against high-value, well-defended targets for the purposes of espionage and sabotage?
CFR-310 Exam Question 45
A government organization responsible for critical infrastructure is being attacked and files on the server been deleted. Which of the following are the most immediate communications that should be made regarding the incident? (Choose two.)