CFR-310 Exam Question 16
It was recently discovered that many of an organization's servers were running unauthorized cryptocurrency mining software. Which of the following assets were being targeted in this attack? (Choose two.)
CFR-310 Exam Question 17
An automatic vulnerability scan has been performed. Which is the next step of the vulnerability assessment process?
CFR-310 Exam Question 18
If a hacker is attempting to alter or delete system audit logs, in which of the following attack phases is the hacker involved?
CFR-310 Exam Question 19
While reviewing some audit logs, an analyst has identified consistent modifications to the sshd_config file for an organization's server. The analyst would like to investigate and compare contents of the current file with archived versions of files that are saved weekly. Which of the following tools will be MOST effective during the investigation?
CFR-310 Exam Question 20
The Key Reinstallation Attack (KRACK) vulnerability is specific to which types of devices? (Choose two.)