Deal of The Day! Hurry Up, Grab the Special Discount - Save 25%
- Ends In
00:00:00
Coupon code:
SAVE25
X
Welcome to Pass4Success
Login
|
Sign up
-
Free
Preparation Discussions
Mail Us
support@pass4success.com
Location
US
MENU
Home
Popular vendors
Salesforce
Microsoft
Nutanix
Amazon
Google
CompTIA
SAP
VMware
Fortinet
PeopleCert
Eccouncil
HP
Palo Alto Networks
Adobe
ServiceNow
Dell EMC
CheckPoint
Linux Foundation
Discount Deals
New
About
Contact
Login
Sign up
Home
Discussions
CertNexus Discussions
Exam CFR-410 Topic 2 Question 54 Discussion
CertNexus Exam CFR-410 Topic 2 Question 54 Discussion
Actual exam question for CertNexus's CFR-410 exam
Question #: 54
Topic #: 2
[All CFR-410 Questions]
Which of the following can increase an attack surface?
A
Old or unused code
B
Vulnerability scanning
C
Mapping of an attack surface
D
Penetration scanning
Show Suggested Answer
Hide Answer
Suggested Answer:
B, E
by
Tamar
at
Feb 07, 2025, 03:37 AM
Limited Time Offer
25%
Off
Get Premium CFR-410 Questions as Interactive Web-Based Practice Test or PDF
Contribute your Thoughts:
Submit
Cancel
Bernadine
1 months ago
Honestly, I think the correct answer is 'All of the above' - it's like a buffet of attack opportunities!
upvoted
0
times
Cecil
18 days ago
C) Mapping of an attack surface
upvoted
0
times
...
Aleisha
19 days ago
B) Vulnerability scanning
upvoted
0
times
...
Delmy
21 days ago
A) Old or unused code
upvoted
0
times
...
...
Benton
1 months ago
Penetration scanning? That's just asking to get punched in the cyber-face.
upvoted
0
times
...
Lemuel
2 months ago
Mapping the attack surface? Sounds like we're creating a treasure map for the bad guys.
upvoted
0
times
Craig
1 months ago
C) Mapping of an attack surface can also increase the attack surface.
upvoted
0
times
...
Shawna
1 months ago
A) Old or unused code can increase the attack surface.
upvoted
0
times
...
...
Aracelis
2 months ago
But what about vulnerability scanning? Wouldn't that help identify and reduce the attack surface?
upvoted
0
times
...
Zena
2 months ago
Vulnerability scanning? More like 'Welcome, hackers! Come on in and make yourselves at home!'
upvoted
0
times
...
Veronika
2 months ago
Old or unused code? That's like leaving the back door unlocked - it's just begging for trouble!
upvoted
0
times
...
Nelida
2 months ago
I agree with Kallie. Old code may have vulnerabilities that can be exploited.
upvoted
0
times
...
Kallie
2 months ago
I think old or unused code can increase an attack surface.
upvoted
0
times
...
Log in to Pass4Success
×
Sign in:
Forgot my password
Log in
Report Comment
×
Is the comment made by
USERNAME
spam or abusive?
Commenting
×
In order to participate in the comments you need to be logged-in.
You can
sign-up
or
login
Save
Cancel
Bernadine
1 months agoCecil
18 days agoAleisha
19 days agoDelmy
21 days agoBenton
1 months agoLemuel
2 months agoCraig
1 months agoShawna
1 months agoAracelis
2 months agoZena
2 months agoVeronika
2 months agoNelida
2 months agoKallie
2 months ago