Free Logical Operations CFR-210 Exam Actual Questions

The questions for CFR-210 were last updated On Nov 7, 2024

Question No. 1

A file is discovered in the /etc directory of an internal server by an automated file integrity checker. A security analyst determines the file is a bash script. The contents are as follows:

---

#/bin/bash

IFS=:

[[-f/etc/passwd]] && cat/etc/passwd |

while read a b c d e f g

do

echo ''$e ($a)''

done

---

Which of the following was the author of the script attempting to gather?

Show Answer Hide Answer
Correct Answer: B

Question No. 2

From a compromised system, an attacker bypasses a proxy server and sends a large amount of data to a remote location. A security analyst is tasked with finding the conduit that was used by the attacker to bypass the proxy. Which of the following Windows tools should be used to find the conduit?

Show Answer Hide Answer
Correct Answer: D

Question No. 3

A logfile generated from a Windows server was moved to a Linux system for further analysis. A system administrator is now making edits to the file with vi and notices the file contains numerous instances of Ctrl-M (^M) characters. Which of the following command line tools is the administrator MOST likely to use to remove these characters from the logfile? (Choose two.)

Show Answer Hide Answer
Correct Answer: A, C

Question No. 4

Which of the following describes pivoting?

Show Answer Hide Answer
Correct Answer: D

Question No. 5

An alert has been triggered identifying a new application running on a Windows server. Which of the following tools can be used to identify the application? (Choose two.)

Show Answer Hide Answer
Correct Answer: D, E