SANS SEC504 Exam Practice Questions (P. 3)
- Full Access (328 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #21
Which of the following types of attacks is the result of vulnerabilities in a program due to poor programming techniques?
- AEvasion attack
- BDenial-of-Service (DoS) attack
- CPing of death attack
- DBuffer overflow attack
Correct Answer:
D
D
send
light_mode
delete
Question #22
Adam works as an Incident Handler for Umbrella Inc. His recent actions towards the incident are not up to the standard norms of the company. He always forgets some steps and procedures while handling responses as they are very hectic to perform.
Which of the following steps should Adam take to overcome this problem with the least administrative effort?
Which of the following steps should Adam take to overcome this problem with the least administrative effort?
- ACreate incident manual read it every time incident occurs.
- BAppoint someone else to check the procedures.
- CCreate incident checklists.
- DCreate new sub-team to keep check.
Correct Answer:
C
C
send
light_mode
delete
Question #23
Jason, a Malicious Hacker, is a student of Baker university. He wants to perform remote hacking on the server of DataSoft Inc. to hone his hacking skills. The company has a Windows-based network. Jason successfully enters the target system remotely by using the advantage of vulnerability. He places a Trojan to maintain future access and then disconnects the remote session. The employees of the company complain to Mark, who works as a Professional Ethical Hacker for DataSoft Inc., that some computers are very slow. Mark diagnoses the network and finds that some irrelevant log files and signs of Trojans are present on the computers. He suspects that a malicious hacker has accessed the network. Mark takes the help from Forensic Investigators and catches Jason.
Which of the following mistakes made by Jason helped the Forensic Investigators catch him?
Which of the following mistakes made by Jason helped the Forensic Investigators catch him?
- AJason did not perform a vulnerability assessment.
- BJason did not perform OS fingerprinting.
- CJason did not perform foot printing.
- DJason did not perform covering tracks.
- EJason did not perform port scanning.
Correct Answer:
D
D
send
light_mode
delete
Question #24
Which of the following is a technique of using a modem to automatically scan a list of telephone numbers, usually dialing every number in a local area code to search for computers, Bulletin board systems, and fax machines?
send
light_mode
delete
Question #25
SIMULATION -
Fill in the blank with the appropriate term.
_______is the practice of monitoring and potentially restricting the flow of information outbound from one network to another
Fill in the blank with the appropriate term.
_______is the practice of monitoring and potentially restricting the flow of information outbound from one network to another
send
light_mode
delete
Question #26
You run the following command while using Nikto Web scanner:
perl nikto.pl -h 192.168.0.1 -p 443
What action do you want to perform?
perl nikto.pl -h 192.168.0.1 -p 443
What action do you want to perform?
- AUsing it as a proxy server
- BUpdating Nikto
- CSeting Nikto for network sniffing
- DPort scanning
Correct Answer:
D
D
send
light_mode
delete
Question #27
Which of the following are types of access control attacks?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
send
light_mode
delete
Question #28
Which of the following tools can be used for stress testing of a Web server?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
send
light_mode
delete
Question #29
Which of the following statements are true about tcp wrappers?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
- Atcp wrapper provides access control, host address spoofing, client username lookups, etc.
- BWhen a user uses a TCP wrapper, the inetd daemon runs the wrapper program tcpd instead of running the server program directly.
- Ctcp wrapper allows host or subnetwork IP addresses, names and/or ident query replies, to be used as tokens to filter for access control purposes.
- Dtcp wrapper protects a Linux server from IP address spoofing.
Correct Answer:
ABC
ABC
send
light_mode
delete
Question #30
Which of the following DoS attacks affects mostly Windows computers by sending corrupt UDP packets?
send
light_mode
delete
All Pages