Monday 17 February 2020

Logical Operations CFR-210 Questions Answers

An incident responder is asked to create a disk image of a compromised Linux server. Which of the following commands should be used to do this?

A. dd
B. Isof
C. gzip
D. fdisk
E. mbr

Answer: A


An intruder gains physical access to a company’s headquarters. The intruder is able to access the company’s network via a visitor’s office. The intruder sets up an
attack device, under the visitor’s office desk, that impersonates the corporate wireless network. Users at headquarters begin to notice slow browsing speeds from
their company laptops. Which of the following attacks is MOST likely occurring?


A. Man-in-the-middle
B. Denial of service
C. Social engineering
D. ARP table poisoning

Answer: D