CFR-410 Exam Question 1

A security investigator has detected an unauthorized insider reviewing files containing company secrets.
Which of the following commands could the investigator use to determine which files have been opened by this user?
  • CFR-410 Exam Question 2

    An incident at a government agency has occurred and the following actions were taken:
    - Users have regained access to email accounts
    - Temporary VPN services have been removed
    - Host-based intrusion prevention system (HIPS) and antivirus (AV) signatures have been updated
    - Temporary email servers have been decommissioned
    Which of the following phases of the incident response process match the actions taken?
  • CFR-410 Exam Question 3

    An unauthorized network scan may be detected by parsing network sniffer data for:
  • CFR-410 Exam Question 4

    Which of the following is a cybersecurity solution for insider threats to strengthen information protection?
  • CFR-410 Exam Question 5

    A company website was hacked via the following SQL query:
    email, passwd, login_id, full_name FROM members
    WHERE email = "[email protected]"; DROP TABLE members; -"
    Which of the following did the hackers perform?