Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

SEC504 SANS Hacker Tools, Techniques, Exploits and Incident Handling Free Practice Exam Questions (2025 Updated)

Prepare effectively for your SANS SEC504 Hacker Tools, Techniques, Exploits and Incident Handling certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 5 / 5
Total 328 questions

Which of the following attacks are examples of Denial-of-service attacks (DoS)?

Each correct answer represents a complete solution. Choose all that apply.

A.

Fraggle attack

B.

Smurf attack

C.

Birthday attack

D.

Ping flood attack

Which of the following are open-source vulnerability scanners?

A.

Nessus

B.

Hackbot

C.

NetRecon

D.

Nikto

John works as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. The company uses Check Point SmartDefense to provide security to the network of the company. On the HTTP servers of the company, John defines a rule for dropping any kind of userdefined URLs. Which of the following types of attacks can be prevented by dropping the user-defined URLs?

A.

Morris worm

B.

Code red worm

C.

Hybrid attacks

D.

PTC worms and mutations

Against which of the following does SSH provide protection?

Each correct answer represents a complete solution. Choose two.

A.

DoS attack

B.

IP spoofing

C.

Password sniffing

D.

Broadcast storm

Which of the following are countermeasures to prevent unauthorized database access attacks?

Each correct answer represents a complete solution. Choose all that apply.

A.

Session encryption

B.

Removing all stored procedures

C.

Applying strong firewall rules

D.

Input sanitization

Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65,536 bytes. On the basis of above information, which of the following types of attack is Adam attempting to perform?

A.

Fraggle attack

B.

Ping of death attack

C.

SYN Flood attack

D.

Land attack

You work as a Network Administrator in the SecureTech Inc. The SecureTech Inc. is using Linux-based server. Recently, you have updated the password policy of the company in which the server will disable passwords after four trials. What type of attack do you want to stop by enabling this policy?

A.

Brute force

B.

Replay

C.

XSS

D.

Cookie poisoning

Which of the following can be used as a countermeasure against the SQL injection attack?

Each correct answer represents a complete solution. Choose two.

A.

mysql_real_escape_string()

B.

session_regenerate_id()

C.

mysql_escape_string()

D.

Prepared statement

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. The company is aware of various types of security attacks and wants to impede them. Hence, management has assigned John a project to port scan the company's Web Server. For this, he uses the nmap port scanner and issues the following command to perform idle port scanning:

nmap -PN -p- -sI IP_Address_of_Company_Server

He analyzes that the server's TCP ports 21, 25, 80, and 111 are open.

Which of the following security policies is the company using during this entire process to mitigate the risk of hacking attacks?

A.

Non-disclosure agreement

B.

Antivirus policy

C.

Acceptable use policy

D.

Audit policy

Which of the following netcat parameters makes netcat a listener that automatically restarts itself when a connection is dropped?

A.

-u

B.

-l

C.

-p

D.

-L

John works as a Penetration Tester in a security service providing firm named you-are-secure Inc. Recently, John's company has got a project to test the security of a promotional Website www.missatlanta.com and assigned the pen-testing work to John. When John is performing penetration testing, he inserts the following script in the search box at the company home page:

<</b>script>alert('Hi, John')<</b>/script>

After pressing the search button, a pop-up box appears on his screen with the text - "Hi, John." Which of the following attacks can be performed on the Web site tested by john while considering the above scenario?

A.

Replay attack

B.

CSRF attack

C.

Buffer overflow attack

D.

XSS attack

You send SYN packets with the exact TTL of the target system starting at port 1 and going up to port 1024 using hping2 utility. This attack is known as __________.

A.

Port scanning

B.

Cloaking

C.

Firewalking

D.

Spoofing

Which of the following tools is used to attack the Digital Watermarking?

A.

Active Attacks

B.

2Mosaic

C.

Steg-Only Attack

D.

Gifshuffle

Which of the following can be used to perform session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

A.

Cross-site scripting

B.

Session fixation

C.

ARP spoofing

D.

Session sidejacking

Which of the following tools uses common UNIX/Linux tools like the strings and grep commands to search core system programs for signatures of the rootkits?

A.

rkhunter

B.

OSSEC

C.

chkrootkit

D.

Blue Pill

Which of the following programming languages are NOT vulnerable to buffer overflow attacks?

Each correct answer represents a complete solution. Choose two.

A.

C

B.

Java

C.

C++

D.

Perl

In which of the following attacks does an attacker create the IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing system?

A.

Rainbow attack

B.

IP address spoofing

C.

Cross-site request forgery

D.

Polymorphic shell code attack

James works as a Database Administrator for Techsoft Inc. The company has a SQL Server 2005 computer. The computer has a database named Sales. Users complain that the performance of the database has deteriorated. James opens the System Monitor tool and finds that there is an increase in network traffic. What kind of attack might be the cause of the performance deterioration?

A.

Denial-of-Service

B.

Injection

C.

Internal attack

D.

Virus

Page: 5 / 5
Total 328 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved