SANS SEC504 Exam Practice Questions (P. 1)
- Full Access (328 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #1
Which of the following Incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an enterprise?
- APreparation phase
- BEradication phase
- CIdentification phase
- DRecovery phase
- EContainment phase
Correct Answer:
A
A
send
light_mode
delete
Question #2
Which of the following statements are true about netcat?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
- AIt provides special tunneling, such as UDP to TCP, with the possibility of specifying all network parameters.
- BIt can be used as a file transfer solution.
- CIt provides outbound and inbound connections for TCP and UDP ports.
- DThe nc -z command can be used to redirect stdin/stdout from a program.
Correct Answer:
ABC
ABC
send
light_mode
delete
Question #3
Which of the following is a reason to implement security logging on a DNS server?
- AFor preventing malware attacks on a DNS server
- BFor measuring a DNS server's performance
- CFor monitoring unauthorized zone transfer
- DFor recording the number of queries resolved
Correct Answer:
C
C
send
light_mode
delete
Question #4
The Klez worm is a mass-mailing worm that exploits a vulnerability to open an executable attachment even in Microsoft Outlook's preview pane. The Klez worm gathers email addresses from the entries of the default Windows Address Book (WAB). Which of the following registry values can be used to identify this worm?
- AHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices
- BHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunMost Voted
- CHKEY_CURRENT_USER\Software\Microsoft\WAB\WAB4\Wab File Name = "file and pathname of the WAB file"
- DHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Correct Answer:
C
C
send
light_mode
delete
Question #5
You work as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. The company wants to fix potential vulnerabilities existing on the tested systems. You use Nessus as a vulnerability scanning program to fix the vulnerabilities. Which of the following vulnerabilities can be fixed using
Nessus?
Each correct answer represents a complete solution. Choose all that apply.
Nessus?
Each correct answer represents a complete solution. Choose all that apply.
- AMisconfiguration (e.g. open mail relay, missing patches, etc.)
- BVulnerabilities that allow a remote cracker to control sensitive data on a system
- CVulnerabilities that allow a remote cracker to access sensitive data on a system
- DVulnerabilities that help in Code injection attacks
Correct Answer:
ABC
ABC
send
light_mode
delete
Question #6
Adam works as a Security Analyst for Umbrella Inc. Company has a Windows-based network. All computers run on Windows XP. Manager of the Sales department complains Adam about the unusual behavior of his computer. He told Adam that some pornographic contents are suddenly appeared on his computer overnight. Adam suspects that some malicious software or Trojans have been installed on the computer. He runs some diagnostics programs and Port scanners and found that the Port 12345, 12346, and 20034 are open. Adam also noticed some tampering with the Windows registry, which causes one application to run every time when Windows start. Which of the following is the most likely reason behind this issue?
- ACheops-ng is installed on the computer.
- BElsave is installed on the computer.
- CNetBus is installed on the computer.Most Voted
- DNetStumbler is installed on the computer.
Correct Answer:
C
C
send
light_mode
delete
Question #7
Which of the following tools is used for vulnerability scanning and calls Hydra to launch a dictionary attack?
send
light_mode
delete
Question #8
In which of the following scanning methods do Windows operating systems send only RST packets irrespective of whether the port is open or closed?
send
light_mode
delete
Question #9
Which of the following malicious software travels across computer networks without the assistance of a user?
send
light_mode
delete
Question #10
Which of the following types of attack can guess a hashed password?
- ABrute force attack
- BEvasion attack
- CDenial of Service attack
- DTeardrop attack
Correct Answer:
A
A
send
light_mode
delete
All Pages