CFR-310 Exam Question 16

It was recently discovered that many of an organization's servers were running unauthorized cryptocurrency mining software. Which of the following assets were being targeted in this attack? (Choose two.)
  • CFR-310 Exam Question 17

    An automatic vulnerability scan has been performed. Which is the next step of the vulnerability assessment process?
  • CFR-310 Exam Question 18

    If a hacker is attempting to alter or delete system audit logs, in which of the following attack phases is the hacker involved?
  • CFR-310 Exam Question 19

    While reviewing some audit logs, an analyst has identified consistent modifications to the sshd_config file for an organization's server. The analyst would like to investigate and compare contents of the current file with archived versions of files that are saved weekly. Which of the following tools will be MOST effective during the investigation?
  • CFR-310 Exam Question 20

    The Key Reinstallation Attack (KRACK) vulnerability is specific to which types of devices? (Choose two.)