A network security analyst has noticed a flood of Simple Mail Transfer Protocol (SMTP) traffic to internal clients. SMTP traffic should only be allowed to email servers. Which of the following commands would stop this attack? (Choose two.)
A. iptables -A INPUT -p tcp –dport 25 -d x.x.x.x -j ACCEPT
B. iptables -A INPUT -p tcp –sport 25 -d x.x.x.x -j ACCEPT
C. iptables -A INPUT -p tcp –dport 25 -j DROP
D. iptables -A INPUT -p tcp –destination-port 21 -j DROP
E. iptables -A FORWARD -p tcp –dport 6881:6889 -j DROP
Which of the following is susceptible to a cache poisoning attack?
A. Domain Name System (DNS)
B. Secure Shell (SSH)
C. Hypertext Transfer Protocol Secure (HTTPS)
D. Hypertext Transfer Protocol (HTTP)
Which of the following are common areas of vulnerabilities in a network switch? (Choose two.)
A. Default port state
B. Default credentials
C. Default protocols
D. Default encryption
E. Default IP address
An automatic vulnerability scan has been performed. Which is the next step of the vulnerability assessment process?
A. Hardening the infrastructure
B. Documenting exceptions
C. Assessing identified exposures
D. Generating reports
An organization recently suffered a data breach involving a server that had Transmission Control Protocol (TCP) port 1433 inadvertently exposed to the Internet. Which of the following services was vulnerable?
A. Internet Message Access Protocol (IMAP)
B. Network Basic Input/Output System (NetBIOS)
C. Database
D. Network Time Protocol (NTP)
Which of the following attacks involves sending a large amount of spoofed User Datagram Protocol (UDP) traffic to a router's broadcast address within a network?
A. Land attack
B. Fraggle attack
C. Smurf attack
D. Teardrop attack
Which of the following are part of the hardening phase of the vulnerability assessment process? (Choose two.)
A. Installing patches
B. Updating configurations
C. Documenting exceptions
D. Conducting audits
E. Generating reports
To minimize vulnerability, which steps should an organization take before deploying a new Internet of Things (IoT) device? (Choose two.)
A. Changing the default password
B. Updating the device firmware
C. Setting up new users
D. Disabling IPv6
E. Enabling the firewall
The Key Reinstallation Attack (KRACK) vulnerability is specific to which types of devices? (Choose two.)
A. Wireless router
B. Switch
C. Firewall
D. Access point
E. Hub
While planning a vulnerability assessment on a computer network, which of the following is essential? (Choose two.)
A. Identifying exposures
B. Identifying critical assets
C. Establishing scope
D. Running scanning tools
E. Installing antivirus software
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Logical Operations exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CFR-410 exam preparations and Logical Operations certification application, do not hesitate to visit our Vcedump.com to find your solutions here.