Vcehome > SANS > Certified Incident Handler > SEC504 > SEC504 Online Practice Questions and Answers

SEC504 Online Practice Questions and Answers

Questions 4

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. On the We-are-secure login page, he enters ='or''=' as a username and successfully logs in to the user page of the Web site.

The we-are-secure login page is vulnerable to a __________.

A. Dictionary attack

B. SQL injection attack

C. Replay attack

D. Land attack

Browse 328 Q&As
Questions 5

You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of security auditing. Recently, your company has assigned you a project to test the security of the we-aresecure.com Web site. For this, you want to perform the idle scan so that you can get the ports open in the we-are-secure.com server. You are using Hping tool to perform the idle scan by using a zombie computer. While scanning, you notice that every IPID is being incremented on every query, regardless whether the ports are open or close. Sometimes, IPID is being incremented by more than one value.

What may be the reason?

A. The firewall is blocking the scanning process.

B. The zombie computer is not connected to the we-are-secure.com Web server.

C. The zombie computer is the system interacting with some other system besides your computer.

D. Hping does not perform idle scanning.

Browse 328 Q&As
Questions 6

You work as a Network Penetration tester in the Secure Inc. Your company takes the projects to test the security of various companies. Recently, Secure Inc. has assigned you a project to test the security of a Web site. You go to the Web site login page and you run the following SQL query:

SELECT email, passwd, login_id, full_name

FROM members

WHERE email = '[email protected]'; DROP TABLE members; --'

What task will the above SQL query perform?

A. Deletes the database in which members table resides.

B. Deletes the rows of members table where email id is '[email protected]' given.

C. Performs the XSS attacks.

D. Deletes the entire members table.

Browse 328 Q&As
Questions 7

You work as a Network Administrator in the SecureTech Inc. The SecureTech Inc. is using Linux-based server. Recently, you have updated the password policy of the company in which the server will disable passwords after four trials.

What type of attack do you want to stop by enabling this policy?

A. Brute force

B. Replay

C. XSS

D. Cookie poisoning

Browse 328 Q&As
Questions 8

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the task:

1.

Smoothening and decreasing contrast by averaging the pixels of the area where significant color transitions occurs.

2.

Reducing noise by adjusting color and averaging pixel value.

3.

Sharpening, Rotating, Resampling, and Softening the image. Which of the following Steganography attacks is Victor using?

A. Stegdetect Attack

B. Chosen-Stego Attack

C. Steg-Only Attack

D. Active Attacks

Browse 328 Q&As
Questions 9

In which of the following attacks does an attacker create the IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing system?

A. Rainbow attack

B. IP address spoofing

C. Cross-site request forgery

D. Polymorphic shell code attack

Browse 328 Q&As
Questions 10

Which of the following attacks can be overcome by applying cryptography?

A. Buffer overflow

B. Web ripping

C. Sniffing

D. DoS

Browse 328 Q&As
Questions 11

You work as a System Administrator for Happy World Inc. Your company has a server named uC1 that runs Windows Server 2008. The Windows Server virtualization role service is installed on the uC1 server which hosts one virtual machine that also runs Windows Server 2008. You are required to install a new application on the virtual machine. You need to ensure that in case of a failure of the application installation, you are able to quickly restore the virtual machine to its original state.

Which of the following actions will you perform to accomplish the task?

A. Use the Virtualization Management Console to save the state of the virtual machine.

B. Log on to the virtual host and create a new dynamically expanding virtual hard disk.

C. Use the Virtualization Management Console to create a snapshot of the virtual machine.

D. Use the Edit Virtual Hard Disk Wizard to copy the virtual hard disk of the virtual machine.

Browse 328 Q&As
Questions 12

Which of the following steps can be taken as countermeasures against sniffer attacks? Each correct answer represents a complete solution. Choose all that apply.

A. Use encrypted protocols for all communications.

B. Use switches instead of hubs since they switch communications, which means that information is delivered only to the predefined host.

C. Use tools such as StackGuard and Immunix System to avoid attacks.

D. Reduce the range of the network to avoid attacks into wireless networks.

Browse 328 Q&As
Questions 13

Your friend plans to install a Trojan on your computer. He knows that if he gives you a new version of chess.exe, you will definitely install the game on your computer. He picks up a Trojan and joins it to chess.exe. The size of chess.exe was 526,895 bytes originally, and after joining this chess file to the Trojan, the file size increased to 651,823 bytes. When he gives you this new game, you install the infected chess.exe file on your computer. He now performs various malicious tasks on your computer remotely. But you suspect that someone has installed a Trojan on your computer and begin to investigate it. When you enter the netstat command in the command prompt, you get the following results:

C:\WINDOWS>netstat -an | find "UDP" UDP IP_Address:31337 *:*

Now you check the following registry address:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServic es

In the above address, you notice a 'default' key in the 'Name' field having " .exe" value in the corresponding 'Data' field.

Which of the following Trojans do you think your friend may have installed on your computer on the basis of the above evidence?

A. Qaz

B. Donald Dick

C. Tini

D. Back Orifice

Browse 328 Q&As
Exam Code: SEC504
Exam Name: Hacker Tools, Techniques, Exploits and Incident Handling
Last Update: May 11, 2024
Questions: 328 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99