SANS SEC504 Exam Practice Questions (P. 5)
- Full Access (328 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #41
Which of the following statements about a Trojan horse are true?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
- AIt is a macro or script that attaches itself to a file or template.
- BThe writers of a Trojan horse can use it later to gain unauthorized access to a computer.
- CIt is a malicious software program code that resembles another normal program.
- DIt infects the boot record on hard disks and floppy disks.
Correct Answer:
BC
BC
send
light_mode
delete
Question #42
In which of the following attacking methods does an attacker distribute incorrect IP address?
send
light_mode
delete
Question #43
Which of the following types of attacks is mounted with the objective of causing a negative impact on the performance of a computer or network?
- AVulnerability attack
- BMan-in-the-middle attack
- CDenial-of-Service (DoS) attack
- DImpersonation attack
Correct Answer:
C
C
send
light_mode
delete
Question #44
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He performs Web vulnerability scanning on the We-are-secure server. The output of the scanning test is as follows:
C:\whisker.pl -h target_IP_address
--whisker / v1.4.0 / rain forest puppy / www.wiretrip.net -- = - = - = - = - = = Host: target_IP_address
= Server: Apache/1.3.12 (Win32) ApacheJServ/1.1 mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22 + 200
OK: HEAD /cgi-bin/printenv -
John recognizes /cgi-bin/printenv vulnerability ('Printenv' vulnerability) in the We_are_secure server. Which of the following statements about 'Printenv' vulnerability are true?
Each correct answer represents a complete solution. Choose all that apply.
C:\whisker.pl -h target_IP_address
--whisker / v1.4.0 / rain forest puppy / www.wiretrip.net -- = - = - = - = - = = Host: target_IP_address
= Server: Apache/1.3.12 (Win32) ApacheJServ/1.1 mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22 + 200
OK: HEAD /cgi-bin/printenv -
John recognizes /cgi-bin/printenv vulnerability ('Printenv' vulnerability) in the We_are_secure server. Which of the following statements about 'Printenv' vulnerability are true?
Each correct answer represents a complete solution. Choose all that apply.
- AThis vulnerability helps in a cross site scripting attack.
- B'Printenv' vulnerability maintains a log file of user activities on the Website, which may be useful for the attacker.
- CThe countermeasure to 'printenv' vulnerability is to remove the CGI script.
- DWith the help of 'printenv' vulnerability, an attacker can input specially crafted links and/or other malicious scripts.
Correct Answer:
ACD
ACD
send
light_mode
delete
Question #45
Which of the following tools can be used for steganography? Each correct answer represents a complete solution. Choose all that apply.
send
light_mode
delete
Question #46
Which of the following tools is an automated tool that is used to implement SQL injections and to retrieve data from Web server databases?
send
light_mode
delete
Question #47
Which of the following attacks come under the category of layer 2 Denial-of-Service attacks? Each correct answer represents a complete solution. Choose all that apply.
- ASpoofing attack
- BSYN flood attack
- CPassword cracking
- DRF jamming attack
Correct Answer:
AB
AB
send
light_mode
delete
Question #48
Which of the following tools can be used to perform brute force attack on a remote database? Each correct answer represents a complete solution. Choose all that apply.
send
light_mode
delete
Question #49
Which of the following are the primary goals of the incident handling team?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
- AFreeze the scene.
- BRepair any damage caused by an incident.
- CPrevent any further damage.
- DInform higher authorities.
Correct Answer:
ABC
ABC
send
light_mode
delete
Question #50
You see the career section of a company's Web site and analyze the job profile requirements. You conclude that the company wants professionals who have a sharp knowledge of Windows server 2003 and Windows active directory installation and placement. Which of the following steps are you using to perform hacking?
send
light_mode
delete
All Pages