Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

SEC504 SANS Hacker Tools, Techniques, Exploits and Incident Handling Free Practice Exam Questions (2025 Updated)

Prepare effectively for your SANS SEC504 Hacker Tools, Techniques, Exploits and Incident Handling certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 3 / 5
Total 328 questions

Which of the following commands can be used for port scanning?

A.

nc -t

B.

nc -z

C.

nc -w

D.

nc -g

You want to scan your network quickly to detect live hosts by using ICMP ECHO Requests. What type of scanning will you perform to accomplish the task?

A.

Idle scan

B.

TCP SYN scan

C.

XMAS scan

D.

Ping sweep scan

Which of the following tools can be used to detect the steganography?

A.

Dskprobe

B.

Blindside

C.

ImageHide

D.

Snow

You run the following command while using Nikto Web scanner:

perl nikto.pl -h 192.168.0.1 -p 443

What action do you want to perform?

A.

Using it as a proxy server

B.

Updating Nikto

C.

Seting Nikto for network sniffing

D.

Port scanning

Which of the following methods can be used to detect session hijacking attack?

A.

nmap

B.

Brutus

C.

ntop

D.

sniffer

Which of the following takes control of a session between a server and a client using TELNET, FTP, or any other non-encrypted TCP/IP utility?

A.

Dictionary attack

B.

Session Hijacking

C.

Trojan horse

D.

Social Engineering

Fill in the blank with the appropriate term.

_______is the practice of monitoring and potentially restricting the flow of information outbound from one network to another

Adam has installed and configured his wireless network. He has enabled numerous security features such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his wireless router. Adam notices that when he uses his wireless connection, the speed is sometimes 16 Mbps and sometimes it is only 8 Mbps or less. Adam connects to the management utility wireless router and finds out that a machine with an unfamiliar name is connected through his wireless connection. Paul checks the router's logs and notices that the unfamiliar machine has the same MAC address as his laptop.

Which of the following attacks has been occurred on the wireless network of Adam?

A.

NAT spoofing

B.

DNS cache poisoning

C.

MAC spoofing

D.

ARP spoofing

Which of the following statements are true about netcat?

Each correct answer represents a complete solution. Choose all that apply.

A.

It provides special tunneling, such as UDP to TCP, with the possibility of specifying all network parameters.

B.

It can be used as a file transfer solution.

C.

It provides outbound and inbound connections for TCP and UDP ports.

D.

The nc -z command can be used to redirect stdin/stdout from a program.

Which of the following types of attacks is only intended to make a computer resource unavailable to its users?

A.

Denial of Service attack

B.

Replay attack

C.

Teardrop attack

D.

Land attack

Which of the following statements about a Trojan horse are true?

Each correct answer represents a complete solution. Choose two.

A.

It is a macro or script that attaches itself to a file or template.

B.

The writers of a Trojan horse can use it later to gain unauthorized access to a computer.

C.

It is a malicious software program code that resembles another normal program.

D.

It infects the boot record on hard disks and floppy disks.

Which of the following is a reason to implement security logging on a DNS server?

A.

For preventing malware attacks on a DNS server

B.

For measuring a DNS server's performance

C.

For monitoring unauthorized zone transfer

D.

For recording the number of queries resolved

Which of the following statements are true about firewalking?

Each correct answer represents a complete solution. Choose all that apply.

A.

To use firewalking, the attacker needs the IP address of the last known gateway before the firewall and the IP address of a host located behind the firewall.

B.

In this technique, an attacker sends a crafted packet with a TTL value that is set to expire one hop past the firewall.

C.

A malicious attacker can use firewalking to determine the types of ports/protocols that can bypass the firewall.

D.

Firewalking works on the UDP packets.

Which of the following are types of access control attacks?

Each correct answer represents a complete solution. Choose all that apply.

A.

Spoofing

B.

Brute force attack

C.

Dictionary attack

D.

Mail bombing

Network mapping provides a security testing team with a blueprint of the organization. Which of the following steps is NOT a part of manual network mapping?

A.

Gathering private and public IP addresses

B.

Collecting employees information

C.

Banner grabbing

D.

Performing Neotracerouting

Which of the following password cracking attacks is based on a pre-calculated hash table to retrieve plain text passwords?

A.

Rainbow attack

B.

Brute Force attack

C.

Dictionary attack

D.

Hybrid attack

Adam, a malicious hacker is running a scan. Statistics of the scan is as follows:

Scan directed at open port: ClientServer

192.5.2.92:4079 ---------FIN--------->192.5.2.110:23192.5.2.92:4079 <</b>----NO RESPONSE---

---192.5.2.110:23

Scan directed at closed port:

ClientServer

192.5.2.92:4079 ---------FIN--------->192.5.2.110:23

192.5.2.92:4079<</b>-----RST/ACK----------192.5.2.110:23

Which of the following types of port scan is Adam running?

A.

ACK scan

B.

FIN scan

C.

XMAS scan

D.

Idle scan

Who are the primary victims of smurf attacks on the contemporary Internet system?

A.

IRC servers are the primary victims to smurf attacks

B.

FTP servers are the primary victims to smurf attacks

C.

SMTP servers are the primary victims to smurf attacks

D.

Mail servers are the primary victims to smurf attacks

Which of the following statements about Denial-of-Service (DoS) attack are true?

Each correct answer represents a complete solution. Choose three.

A.

It disrupts services to a specific computer.

B.

It changes the configuration of the TCP/IP protocol.

C.

It saturates network resources.

D.

It disrupts connections between two computers, preventing communications between services.

Your network is being flooded by ICMP packets. When you trace them down they come from multiple different IP addresses. What kind of attack is this?

A.

Syn flood

B.

Ping storm

C.

Smurf attack

D.

DDOS

Page: 3 / 5
Total 328 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved