Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

SEC504 SANS Hacker Tools, Techniques, Exploits and Incident Handling Free Practice Exam Questions (2025 Updated)

Prepare effectively for your SANS SEC504 Hacker Tools, Techniques, Exploits and Incident Handling certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 5
Total 328 questions

Which of the following attacks involves multiple compromised systems to attack a single target?

A.

Brute force attack

B.

Replay attack

C.

Dictionary attack

D.

DDoS attack

TCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote device during standard layer 4 network communications. The combination of parameters may then be used to infer the remote operating system (OS fingerprinting), or incorporated into a device fingerprint.

Which of the following Nmap switches can be used to perform TCP/IP stack fingerprinting?

A.

nmap -sS

B.

nmap -sU -p

C.

nmap -O -p

D.

nmap -sT

Which of the following attacking methods allows the bypassing of access control lists on servers or routers, either hiding a computer on a network or allowing it to impersonate another computer by changing the Media Access Control address?

A.

IP address spoofing

B.

VLAN hoping

C.

ARP spoofing

D.

MAC spoofing

Adam works as a Network administrator for Umbrella Inc. He noticed that an ICMP ECHO requests is coming from some suspected outside sources. Adam suspects that some malicious hacker is trying to perform ping sweep attack on the network of the company. To stop this malicious activity, Adam blocks the ICMP ECHO request from any outside sources.

What will be the effect of the action taken by Adam?

A.

Network turns completely immune from the ping sweep attacks.

B.

Network is still vulnerable to ping sweep attack.

C.

Network is protected from the ping sweep attack until the next reboot of the server.

D.

Network is now vulnerable to Ping of death attack.

Which of the following attacks saturates network resources and disrupts services to a specific computer?

A.

Replay attack

B.

Teardrop attack

C.

Denial-of-Service (DoS) attack

D.

Polymorphic shell code attack

John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?

Each correct answer represents a complete solution. Choose all that apply.

A.

Hybrid attack

B.

Rule based attack

C.

Dictionary attack

D.

Brute Force attack

You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network. Which of the following phases of the Incident handling process should you follow next to handle this incident?

A.

Containment

B.

Preparation

C.

Recovery

D.

Identification

Which of the following statements are true regarding SYN flood attack?

A.

The attacker sends a succession of SYN requests to a target system.

B.

SYN flood is a form of Denial-of-Service (DoS) attack.

C.

The attacker sends thousands and thousands of ACK packets to the victim.

D.

SYN cookies provide protection against the SYN flood by eliminating the resources allocated on the target host.

Firewalking is a technique that can be used to gather information about a remote network protected by a firewall. This technique can be used effectively to perform information gathering attacks. In this technique, an attacker sends a crafted packet with a TTL value that is set to expire one hop past the firewall. Which of the following are pre-requisites for an attacker to conduct firewalking?

Each correct answer represents a complete solution. Choose all that apply.

A.

An attacker should know the IP address of a host located behind the firewall.

B.

ICMP packets leaving the network should be allowed.

C.

There should be a backdoor installed on the network.

D.

An attacker should know the IP address of the last known gateway before the firewall.

A Denial-of-Service (DoS) attack is mounted with the objective of causing a negative impact on the performance of a computer or network. It is also known as network saturation attack or bandwidth consumption attack. Attackers perform DoS attacks by sending a large number of protocol packets to a network. The problems caused by a DoS attack are as follows:

l Saturation of network resources

l Disruption of connections between two computers, thereby preventing communications between services

l Disruption of services to a specific computer

l Failure to access a Web site

l Increase in the amount of spam

Which of the following can be used as countermeasures against DoS attacks?

Each correct answer represents a complete solution. Choose all that apply.

A.

Blocking undesired IP addresses

B.

Applying router filtering

C.

Disabling unneeded network services

D.

Permitting network access only to desired traffic

Your IDS discovers that an intruder has gained access to your system. You immediately stop that access, change passwords for administrative accounts, and secure your network. You discover an odd account (not administrative) that has permission to remotely access the network. What is this most likely?

A.

An example of privilege escalation.

B.

A normal account you simply did not notice before. Large networks have a number of accounts; it is hard to track them all.

C.

A backdoor the intruder created so that he can re-enter the network.

D.

An example of IP spoofing.

Which of the following describes network traffic that originates from the inside of a network perimeter and progresses towards the outside?

A.

Ingress network

B.

Inwards network

C.

Egress network

D.

Outwards network

Which of the following controls is described in the statement given below?

"It ensures that the enforcement of organizational security policy does not rely on voluntary web application user compliance. It secures information by assigning sensitivity labels on information and comparing this to the level of security a user is operating at."

A.

Role-based Access Control

B.

Attribute-based Access Control

C.

Discretionary Access Control

D.

Mandatory Access Control

Which of the following threats is a combination of worm, virus, and Trojan horse characteristics?

A.

Spyware

B.

Heuristic

C.

Blended

D.

Rootkits

Which of the following provides packet-level encryption between hosts in a LAN?

A.

PPTP

B.

IPsec

C.

PFS

D.

Tunneling protocol

In which of the following attacks does an attacker use packet sniffing to read network traffic between two parties to steal the session cookie?

A.

Session fixation

B.

Cross-site scripting

C.

Session sidejacking

D.

ARP spoofing

Which of the following types of rootkits replaces regular application binaries with Trojan fakes and modifies the behavior of existing applications using hooks, patches, or injected code?

A.

Application level rootkit

B.

Hypervisor rootkit

C.

Kernel level rootkit

D.

Boot loader rootkit

Which of the following are the rules by which an organization operates?

A.

Acts

B.

Policies

C.

Rules

D.

Manuals

Which of the following statements about threats are true?

Each correct answer represents a complete solution. Choose all that apply.

A.

A threat is a weakness or lack of safeguard that can be exploited by vulnerability, thus causing harm to the information systems or networks.

B.

A threat is a potential for violation of security which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.

C.

A threat is a sequence of circumstances and events that allows a human or other agent to cause an information-related misfortune by exploiting vulnerability in an IT product.

D.

A threat is any circumstance or event with the potential of causing harm to a system in the form of destruction, disclosure, modification of data, or denial of service.

Which of the following is the most common vulnerability that can affect desktop applications written in native code?

A.

SpyWare

B.

DDoS attack

C.

Malware

D.

Buffer overflow

Page: 1 / 5
Total 328 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved