Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

SEC504 Hacker Tools, Techniques, Exploits and Incident Handling Questions and Answers

Questions 4

Which of the following rootkits patches, hooks, or replaces system calls with versions that hide information about the attacker?

Options:

A.

Library rootkit

B.

Kernel level rootkit

C.

Hypervisor rootkit

D.

Boot loader rootkit

Buy Now
Questions 5

You are responsible for security at a company that uses a lot of Web applications. You are most concerned about flaws in those applications allowing some attacker to get into your network. What method would be best for finding such flaws?

Options:

A.

Manual penetration testing

B.

Code review

C.

Automated penetration testing

D.

Vulnerability scanning

Buy Now
Questions 6

Which of the following statements are true about a keylogger?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It records all keystrokes on the victim ' s computer in a predefined log file.

B.

It can be remotely installed on a computer system.

C.

It is a software tool used to trace all or specific activities of a user on a computer.

D.

It uses hidden code to destroy or scramble data on the hard disk.

Buy Now
Questions 7

Which of the following nmap command parameters is used for TCP SYN port scanning?

Options:

A.

-sF

B.

-sU

C.

-sX

D.

-sS

Buy Now
Questions 8

You are the Administrator for a corporate network. You are concerned about denial of service attacks.

Which of the following measures would be most helpful in defending against a Denial-of-Service (DoS) attack?

Options:

A.

Implement network based antivirus.

B.

Place a honey pot in the DMZ.

C.

Shorten the timeout for connection attempts.

D.

Implement a strong password policy.

Buy Now
Questions 9

Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses ' Faulkner ' as the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating that his gmail account has been hacked. He also finds that some of his important mails have been deleted by someone. Which of the following methods has the attacker used to crack Andrew ' s password?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Denial-of-service (DoS) attack

B.

Zero-day attack

C.

Brute force attack

D.

Social engineering

E.

Buffer-overflow attack

F.

Rainbow attack

G.

Password guessing

Buy Now
Questions 10

Which of the following reads and writes data across network connections by using the TCP/IP protocol?

Options:

A.

Fpipe

B.

NSLOOKUP

C.

Netcat

D.

2Mosaic

Buy Now
Questions 11

You have inserted a Trojan on your friend ' s computer and you want to put it in the startup so that whenever the computer reboots the Trojan will start to run on the startup. Which of the following registry entries will you edit to accomplish the task?

Options:

A.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Startup

B.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Auto

C.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices

D.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Start

Buy Now
Questions 12

You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of security auditing. Recently, your company has assigned you a project to test the security of the we-aresecure.com Web site. For this, you want to perform the idle scan so that you can get the ports open in the we-are-secure.com server. You are using Hping tool to perform the idle scan by using a zombie computer. While scanning, you notice that every IPID is being incremented on every query, regardless whether the ports are open or close. Sometimes, IPID is being incremented by more than one value.

What may be the reason?

Options:

A.

The firewall is blocking the scanning process.

B.

The zombie computer is not connected to the we-are-secure.com Web server.

C.

The zombie computer is the system interacting with some other system besides your computer.

D.

Hping does not perform idle scanning.

Buy Now
Questions 13

Adam, a malicious hacker is sniffing the network to inject ARP packets. He injects broadcast frames onto the wire to conduct Man-in-The-Middle attack.

Which of the following is the destination MAC address of a broadcast frame?

Options:

A.

0xDDDDDDDDD

B.

0x00000000000

C.

0xFFFFFFFFFFFF

D.

0xAAAAAAAAAA

Buy Now
Questions 14

John visits an online shop that stores the IDs and prices of the items to buy in a cookie. After selecting the items that he wants to buy, the attacker changes the price of the item to 1.

Original cookie values:

ItemID1=2

ItemPrice1=900

ItemID2=1

ItemPrice2=200

Modified cookie values:

ItemID1=2

ItemPrice1=1

ItemID2=1

ItemPrice2=1

Now, he clicks the Buy button, and the prices are sent to the server that calculates the total price.

Which of the following hacking techniques is John performing?

Options:

A.

Computer-based social engineering

B.

Man-in-the-middle attack

C.

Cross site scripting

D.

Cookie poisoning

Buy Now
Questions 15

You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Eradication

B.

Contamination

C.

Preparation

D.

Recovery

E.

Identification

Buy Now
Questions 16

Which of the following attacks are examples of Denial-of-service attacks (DoS)?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Fraggle attack

B.

Smurf attack

C.

Birthday attack

D.

Ping flood attack

Buy Now
Questions 17

Which of the following is a type of computer security vulnerability typically found in Web applications that allow code injection by malicious Web users into the Web pages viewed by other users?

Options:

A.

SID filtering

B.

Cookie poisoning

C.

Cross-site scripting

D.

Privilege Escalation

Buy Now
Questions 18

Which of the following tools is used to attack the Digital Watermarking?

Options:

A.

Active Attacks

B.

2Mosaic

C.

Steg-Only Attack

D.

Gifshuffle

Buy Now
Questions 19

Fill in the blank with the appropriate term.

_______is the practice of monitoring and potentially restricting the flow of information outbound from one network to another

Options:

Buy Now
Questions 20

Which of the following are the primary goals of the incident handling team?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Freeze the scene.

B.

Repair any damage caused by an incident.

C.

Prevent any further damage.

D.

Inform higher authorities.

Buy Now
Questions 21

John works as a Professional Penetration Tester. He has been assigned a project to test the Website security of www.we-are-secure Inc. On the We-are-secure Website login page, he enters = ' or ' ' = ' as a username and successfully logs on to the user page of the Web site. Now, John asks the we-aresecure Inc. to improve the login page PHP script. Which of the following suggestions can John give to improve the security of the we-are-secure Website login page from the SQL injection attack?

Options:

A.

Use the escapeshellarg() function

B.

Use the session_regenerate_id() function

C.

Use the mysql_real_escape_string() function for escaping input

D.

Use the escapeshellcmd() function

Buy Now
Questions 22

Fill in the blank with the correct numeric value.

ARP poisoning is achieved in ______ steps.

Options:

Buy Now
Questions 23

Alice wants to prove her identity to Bob. Bob requests her password as proof of identity, which Alice dutifully provides (possibly after some transformation like a hash function); meanwhile, Eve is eavesdropping the conversation and keeps the password. After the interchange is over, Eve connects to Bob posing as Alice; when asked for a proof of identity, Eve sends Alice ' s password read from the last session, which Bob accepts. Which of the following attacks is being used by Eve?

Options:

A.

Replay

B.

Firewalking

C.

Session fixation

D.

Cross site scripting

Buy Now
Questions 24

Fill in the blank with the appropriate word.

StackGuard (as used by Immunix), ssp/ProPolice (as used by OpenBSD), and Microsoft ' s /GS option use ______ defense against buffer overflow attacks.

Options:

Buy Now
Questions 25

Your company has been hired to provide consultancy, development, and integration services for a company named Brainbridge International. You have prepared a case study to plan the upgrade for the company. Based on the case study, which of the following steps will you suggest for configuring WebStore1?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Customize IIS 6.0 to display a legal warning page on the generation of the 404.2 and 404.3 errors.

B.

Move the WebStore1 server to the internal network.

C.

Configure IIS 6.0 on WebStore1 to scan the URL for known buffer overflow attacks.

D.

Move the computer account of WebStore1 to the Remote organizational unit (OU).

Buy Now
Questions 26

Which of the following statements are true about netcat?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It provides special tunneling, such as UDP to TCP, with the possibility of specifying all network parameters.

B.

It can be used as a file transfer solution.

C.

It provides outbound and inbound connections for TCP and UDP ports.

D.

The nc -z command can be used to redirect stdin/stdout from a program.

Buy Now
Questions 27

Which of the following tools will you use to prevent from session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

OpenSSH

B.

Rlogin

C.

Telnet

D.

SSL

Buy Now
Questions 28

Which of the following US Acts emphasized a " risk-based policy for cost-effective security " and makes mandatory for agency program officials, chief information officers, and inspectors general (IGs) to conduct annual reviews of the agency ' s information security program and report the results to Office of Management and Budget?

Options:

A.

The Electronic Communications Privacy Act of 1986 (ECPA)

B.

The Fair Credit Reporting Act (FCRA)

C.

The Equal Credit Opportunity Act (ECOA)

D.

Federal Information Security Management Act of 2002 (FISMA)

Buy Now
Questions 29

In which of the following attacks does the attacker gather information to perform an access attack?

Options:

A.

Land attack

B.

Reconnaissance attack

C.

Vulnerability attack

D.

DoS attack

Buy Now
Questions 30

Which of the following programs can be used to detect stealth port scans performed by a malicious hacker?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

nmap

B.

scanlogd

C.

libnids

D.

portsentry

Buy Now
Questions 31

Which of the following techniques is used when a system performs the penetration testing with the objective of accessing unauthorized information residing inside a computer?

Options:

A.

Van Eck Phreaking

B.

Phreaking

C.

Biometrician

D.

Port scanning

Buy Now
Questions 32

Which of the following malicious code can have more than one type of trigger, multiple task capabilities, and can replicate itself in more than one manner?

Options:

A.

Macro virus

B.

Blended threat

C.

Trojan

D.

Boot sector virus

Buy Now
Questions 33

Which of the following functions can you use to mitigate a command injection attack?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

escapeshellarg()

B.

escapeshellcmd()

C.

htmlentities()

D.

strip_tags()

Buy Now
Questions 34

Which of the following Denial-of-Service (DoS) attacks employ IP fragmentation mechanism?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Land attack

B.

SYN flood attack

C.

Teardrop attack

D.

Ping of Death attack

Buy Now
Questions 35

Which of the following statements about Denial-of-Service (DoS) attack are true?

Each correct answer represents a complete solution. Choose three.

Options:

A.

It disrupts services to a specific computer.

B.

It changes the configuration of the TCP/IP protocol.

C.

It saturates network resources.

D.

It disrupts connections between two computers, preventing communications between services.

Buy Now
Questions 36

In which of the following attacking methods does an attacker distribute incorrect IP address?

Options:

A.

IP spoofing

B.

Mac flooding

C.

DNS poisoning

D.

Man-in-the-middle

Buy Now
Questions 37

In which of the following scanning methods do Windows operating systems send only RST packets irrespective of whether the port is open or closed?

Options:

A.

TCP FIN

B.

FTP bounce

C.

XMAS

D.

TCP SYN

Buy Now
Questions 38

Maria works as a professional Ethical Hacker. She is assigned a project to test the security of www.we-are-secure.com. She wants to test a DoS attack on the We-are-secure server. She finds that the firewall of the server is blocking the ICMP messages, but it is not checking the UDP packets. Therefore, she sends a large amount of UDP echo request traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the We-are-secure server. Which of the following DoS attacks is Maria using to accomplish her task?

Options:

A.

Ping flood attack

B.

Fraggle DoS attack

C.

Teardrop attack

D.

Smurf DoS attack

Buy Now
Questions 39

Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?

Options:

A.

Piggybacking

B.

Hacking

C.

Session hijacking

D.

Keystroke logging

Buy Now
Questions 40

You work as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. The company wants to fix potential vulnerabilities existing on the tested systems. You use Nessus as a vulnerability scanning program to fix the vulnerabilities. Which of the following vulnerabilities can be fixed using Nessus?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Misconfiguration (e.g. open mail relay, missing patches, etc.)

B.

Vulnerabilities that allow a remote cracker to control sensitive data on a system

C.

Vulnerabilities that allow a remote cracker to access sensitive data on a system

D.

Vulnerabilities that help in Code injection attacks

Buy Now
Questions 41

Which of the following is a computer worm that caused a denial of service on some Internet hosts and dramatically slowed down general Internet traffic?

Options:

A.

Klez

B.

Code red

C.

SQL Slammer

D.

Beast

Buy Now
Questions 42

Ryan, a malicious hacker submits Cross-Site Scripting (XSS) exploit code to the Website of Internet forum for online discussion. When a user visits the infected Web page, code gets automatically executed and Ryan can easily perform acts like account hijacking, history theft etc. Which of the following types of Cross-Site Scripting attack Ryan intends to do?

Options:

A.

Non persistent

B.

Document Object Model (DOM)

C.

SAX

D.

Persistent

Buy Now
Questions 43

Which of the following tools can be used to perform brute force attack on a remote database?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

SQLBF

B.

SQLDict

C.

FindSA

D.

nmap

Buy Now
Questions 44

You are hired as a Database Administrator for Jennifer Shopping Cart Inc. You monitor the server health through the System Monitor and found that there is a sudden increase in the number of logins.

Which of the following types of attack has occurred?

Options:

A.

Injection

B.

Virus

C.

Worm

D.

Denial-of-service

Buy Now
Questions 45

Which of the following statements about reconnaissance is true?

Options:

A.

It describes an attempt to transfer DNS zone data.

B.

It is a computer that is used to attract potential intruders or attackers.

C.

It is any program that allows a hacker to connect to a computer without going through the normal authentication process.

D.

It is also known as half-open scanning.

Buy Now
Questions 46

In the DNS Zone transfer enumeration, an attacker attempts to retrieve a copy of the entire zone file for a domain from a DNS server. The information provided by the DNS zone can help an attacker gather user names, passwords, and other valuable information. To attempt a zone transfer, an attacker must be connected to a DNS server that is the authoritative server for that zone. Besides this, an attacker can launch a Denial of Service attack against the zone ' s DNS servers by flooding them with a lot of requests. Which of the following tools can an attacker use to perform a DNS zone transfer?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Host

B.

Dig

C.

DSniff

D.

NSLookup

Buy Now
Questions 47

Fill in the blank with the appropriate name of the attack.

______ takes best advantage of an existing authenticated connection

Options:

Buy Now
Questions 48

Which of the following DoS attacks affects mostly Windows computers by sending corrupt UDP packets?

Options:

A.

Fraggle

B.

Ping flood

C.

Bonk

D.

Smurf

Buy Now
Questions 49

Adam works as a Network Administrator for PassGuide Inc. He wants to prevent the network from DOS attacks. Which of the following is most useful against DOS attacks?

Options:

A.

SPI

B.

Distributive firewall

C.

Honey Pot

D.

Internet bot

Buy Now
Questions 50

Against which of the following does SSH provide protection?

Each correct answer represents a complete solution. Choose two.

Options:

A.

DoS attack

B.

IP spoofing

C.

Password sniffing

D.

Broadcast storm

Buy Now
Questions 51

Which of the following types of malware can an antivirus application disable and destroy?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Rootkit

B.

Trojan

C.

Crimeware

D.

Worm

E.

Adware

F.

Virus

Buy Now
Questions 52

Who are the primary victims of smurf attacks on the contemporary Internet system?

Options:

A.

IRC servers are the primary victims to smurf attacks

B.

FTP servers are the primary victims to smurf attacks

C.

SMTP servers are the primary victims to smurf attacks

D.

Mail servers are the primary victims to smurf attacks

Buy Now
Questions 53

Which of the following takes control of a session between a server and a client using TELNET , FTP , or any other non-encrypted TCP/IP utility?

Options:

A.

Dictionary attack

B.

Session Hijacking

C.

Trojan horse

D.

Social Engineering

Buy Now
Questions 54

Which of the following types of attacks is mounted with the objective of causing a negative impact on the performance of a computer or network?

Options:

A.

Vulnerability attack

B.

Man-in-the-middle attack

C.

Denial-of-Service (DoS) attack

D.

Impersonation attack

Buy Now
Questions 55

Which of the following tools can be used for stress testing of a Web server?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Internet bots

B.

Scripts

C.

Anti-virus software

D.

Spyware

Buy Now
Questions 56

You see the career section of a company ' s Web site and analyze the job profile requirements. You conclude that the company wants professionals who have a sharp knowledge of Windows server 2003 and Windows active directory installation and placement. Which of the following steps are you using to perform hacking?

Options:

A.

Scanning

B.

Covering tracks

C.

Reconnaissance

D.

Gaining access

Buy Now
Questions 57

Which of the following is a network worm that exploits the RPC sub-system vulnerability present in the Microsoft Windows operating system?

Options:

A.

Win32/Agent

B.

WMA/TrojanDownloader.GetCodec

C.

Win32/Conflicker

D.

Win32/PSW.OnLineGames

Buy Now
Questions 58

You work as a System Administrator in SunSoft Inc. You are running a virtual machine on Windows Server 2003. The virtual machine is protected by DPM. Now, you want to move the virtual machine to another host. Which of the following steps can you use to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Remove the original virtual machine from the old server and stop the protection for the original virtual machine.

B.

Run consistency check.

C.

Add the copied virtual machine to a protection group.

D.

Copy the virtual machine to the new server.

Buy Now
Questions 59

You work as a Network Administrator for Marioxnet Inc. You have the responsibility of handling two routers with BGP protocol for the enterprise ' s network. One of the two routers gets flooded with an unexpected number of data packets, while the other router starves with no packets reaching it. Which of the following attacks can be a potential cause of this?

Options:

A.

Packet manipulation

B.

Denial-of-Service

C.

Spoofing

D.

Eavesdropping

Buy Now
Questions 60

John works as a Penetration Tester in a security service providing firm named you-are-secure Inc. Recently, John ' s company has got a project to test the security of a promotional Website www.missatlanta.com and assigned the pen-testing work to John. When John is performing penetration testing, he inserts the following script in the search box at the company home page:

<</b> script > alert( ' Hi, John ' ) <</b> /script >

After pressing the search button, a pop-up box appears on his screen with the text - " Hi, John. " Which of the following attacks can be performed on the Web site tested by john while considering the above scenario?

Options:

A.

Replay attack

B.

CSRF attack

C.

Buffer overflow attack

D.

XSS attack

Buy Now
Questions 61

In which of the following attacks does an attacker spoof the source address in IP packets that are sent to the victim?

Options:

A.

Dos

B.

DDoS

C.

Backscatter

D.

SQL injection

Buy Now
Questions 62

Which of the following statements about Ping of Death attack is true?

Options:

A.

In this type of attack, a hacker sends more traffic to a network address than the buffer can handle.

B.

This type of attack uses common words in either upper or lower case to find a password.

C.

In this type of attack, a hacker maliciously cuts a network cable.

D.

In this type of attack, a hacker sends ICMP packets greater than 65,536 bytes to crash a system.

Buy Now
Questions 63

Which of the following statements about buffer overflow is true?

Options:

A.

It manages security credentials and public keys for message encryption.

B.

It is a collection of files used by Microsoft for software updates released between major service pack releases.

C.

It is a condition in which an application receives more data than it is configured to accept.

D.

It is a false warning about a virus.

Buy Now
Questions 64

In which of the following attacks does an attacker use packet sniffing to read network traffic between two parties to steal the session cookie?

Options:

A.

Session fixation

B.

Cross-site scripting

C.

Session sidejacking

D.

ARP spoofing

Buy Now
Questions 65

Which of the following is the difference between SSL and S-HTTP?

Options:

A.

SSL operates at the application layer and S-HTTP operates at the network layer.

B.

SSL operates at the application layer and S-HTTP operates at the transport layer.

C.

SSL operates at the network layer and S-HTTP operates at the application layer.

D.

SSL operates at the transport layer and S-HTTP operates at the application layer.

Buy Now
Questions 66

Which of the following statements is true about a Trojan engine?

Options:

A.

It limits the system resource usage.

B.

It specifies the signatures that keep a watch for a host or a network sending multiple packets to a single host or a single network.

C.

It specifies events that occur in a related manner within a sliding time interval.

D.

It analyzes the nonstandard protocols, such as TFN2K and BO2K.

Buy Now
Questions 67

Which of the following languages are vulnerable to a buffer overflow attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Java

B.

C++

C.

C

D.

Action script

Buy Now
Questions 68

Which of the following statements about buffer overflow are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is a situation that occurs when a storage device runs out of space.

B.

It is a situation that occurs when an application receives more data than it is configured to accept.

C.

It can improve application performance.

D.

It can terminate an application.

Buy Now
Questions 69

Which of the following types of attacks slows down or stops a server by overloading it with requests?

Options:

A.

DoS attack

B.

Impersonation attack

C.

Network attack

D.

Vulnerability attack

Buy Now
Questions 70

A Denial-of-Service (DoS) attack is mounted with the objective of causing a negative impact on the performance of a computer or network. It is also known as network saturation attack or bandwidth consumption attack. Attackers perform DoS attacks by sending a large number of protocol packets to a network. The problems caused by a DoS attack are as follows:

l Saturation of network resources

l Disruption of connections between two computers, thereby preventing communications between services

l Disruption of services to a specific computer

l Failure to access a Web site

l Increase in the amount of spam

Which of the following can be used as countermeasures against DoS attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Blocking undesired IP addresses

B.

Applying router filtering

C.

Disabling unneeded network services

D.

Permitting network access only to desired traffic

Buy Now
Questions 71

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Linguistic steganography

B.

Perceptual masking

C.

Technical steganography

D.

Text Semagrams

Buy Now
Questions 72

Which of the following rootkits is able to load the original operating system as a virtual machine, thereby enabling it to intercept all hardware calls made by the original operating system?

Options:

A.

Kernel level rootkit

B.

Boot loader rootkit

C.

Hypervisor rootkit

D.

Library rootkit

Buy Now
Questions 73

In which of the following malicious hacking steps does email tracking come under?

Options:

A.

Reconnaissance

B.

Gaining access

C.

Maintaining Access

D.

Scanning

Buy Now
Questions 74

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare-secure.com. He is working on the Linux operating system. He wants to sniff the we-are-secure network and intercept a conversation between two employees of the company through session hijacking. Which of the following tools will John use to accomplish the task?

Options:

A.

Hunt

B.

IPChains

C.

Ethercap

D.

Tripwire

Buy Now
Questions 75

Which of the following can be used to perform session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Cross-site scripting

B.

Session fixation

C.

ARP spoofing

D.

Session sidejacking

Buy Now
Questions 76

Which of the following HTTP requests is the SQL injection attack?

Options:

A.

http://www.xsecurity.com/cgiin/bad.cgi?foo=..%fc%80%80%80%80%af../bin/ls%20-al

B.

http://www.victim.com/example?accountnumber=67891 & creditamount=999999999

C.

http://www.myserver.com/search.asp?lname=adam%27%3bupdate%20usertable%20set% 20pass wd%3d %27hCx0r%27%3b--%00

D.

http://www.myserver.com/script.php?mydata=%3cscript%20src=%22http%3a%2f%

2fwww.yourser ver.c0m %2fbadscript.js%22%3e%3c%2fscript%3e

Buy Now
Questions 77

Which of the following describes network traffic that originates from the inside of a network perimeter and progresses towards the outside?

Options:

A.

Ingress network

B.

Inwards network

C.

Egress network

D.

Outwards network

Buy Now
Questions 78

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

Options:

A.

Email spoofing

B.

Steganography

C.

Web ripping

D.

Social engineering

Buy Now
Questions 79

Which of the following protocols uses only User Datagram Protocol (UDP)?

Options:

A.

POP3

B.

FTP

C.

ICMP

D.

TFTP

Buy Now
Questions 80

Which of the following tools is used for port scanning?

Options:

A.

NSLOOKUP

B.

NETSH

C.

Nmap

D.

L0phtcrack

Buy Now
Questions 81

Which of the following virus is a script that attaches itself to a file or template?

Options:

A.

Boot sector

B.

Trojan horse

C.

Macro virus

D.

E-mail virus

Buy Now
Questions 82

Which of the following wireless network security solutions refers to an authentication process in which a user can connect wireless access points to a centralized server to ensure that all hosts are properly authenticated?

Options:

A.

Remote Authentication Dial-In User Service (RADIUS)

B.

IEEE 802.1x

C.

Wired Equivalent Privacy (WEP)

D.

Wi-Fi Protected Access 2 (WPA2)

Buy Now
Questions 83

Which of the following types of scan does not open a full TCP connection?

Options:

A.

FIN scan

B.

ACK scan

C.

Stealth scan

D.

Idle scan

Buy Now
Questions 84

Which of the following statements about threats are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

A threat is a weakness or lack of safeguard that can be exploited by vulnerability, thus causing harm to the information systems or networks.

B.

A threat is a potential for violation of security which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.

C.

A threat is a sequence of circumstances and events that allows a human or other agent to cause an information-related misfortune by exploiting vulnerability in an IT product.

D.

A threat is any circumstance or event with the potential of causing harm to a system in the form of destruction, disclosure, modification of data, or denial of service.

Buy Now
Questions 85

Which of the following is a method of gaining access to a system that bypasses normal authentication?

Options:

A.

Teardrop

B.

Trojan horse

C.

Back door

D.

Smurf

Buy Now
Questions 86

John works as a C programmer. He develops the following C program:

#include < stdlib.h >

#include < stdio.h >

#include < string.h >

int buffer(char *str) {

char buffer1[10];

strcpy(buffer1, str);

return 1;

}

int main(int argc, char *argv[]) {

buffer (argv[1]);

printf( " Executed\n " );

return 1;

}

His program is vulnerable to a __________ attack.

Options:

A.

SQL injection

B.

Denial-of-Service

C.

Buffer overflow

D.

Cross site scripting

Buy Now
Questions 87

Which of the following statements are correct about spoofing and session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Spoofing is an attack in which an attacker can spoof the IP address or other identity of the target and the valid user cannot be active.

B.

Spoofing is an attack in which an attacker can spoof the IP address or other identity of the target but the valid user can be active.

C.

Session hijacking is an attack in which an attacker takes over the session, and the valid user ' s session is disconnected.

D.

Session hijacking is an attack in which an attacker takes over the session, and the valid user ' s session is not disconnected.

Buy Now
Questions 88

Which of the following are the limitations for the cross site request forgery (CSRF) attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The attacker must determine the right values for all the form inputs.

B.

The attacker must target a site that doesn ' t check the referrer header.

C.

The target site should have limited lifetime authentication cookies.

D.

The target site should authenticate in GET and POST parameters, not only cookies.

Buy Now
Questions 89

Which of the following controls is described in the statement given below?

" It ensures that the enforcement of organizational security policy does not rely on voluntary web application user compliance. It secures information by assigning sensitivity labels on information and comparing this to the level of security a user is operating at. "

Options:

A.

Role-based Access Control

B.

Attribute-based Access Control

C.

Discretionary Access Control

D.

Mandatory Access Control

Buy Now
Questions 90

Which of the following applications is NOT used for passive OS fingerprinting?

Options:

A.

Networkminer

B.

Satori

C.

p0f

D.

Nmap

Buy Now
Questions 91

You are the Administrator for a corporate network. You are concerned about denial of service attacks.

Which of the following would be the most help against Denial of Service (DOS) attacks?

Options:

A.

Packet filtering firewall

B.

Network surveys.

C.

Honey pot

D.

Stateful Packet Inspection (SPI) firewall

Buy Now
Questions 92

Which of the following is used to determine the range of IP addresses that are mapped to a live hosts?

Options:

A.

Port sweep

B.

Ping sweep

C.

IP sweep

D.

Telnet sweep

Buy Now
Questions 93

Which of the following is the most common vulnerability that can affect desktop applications written in native code?

Options:

A.

SpyWare

B.

DDoS attack

C.

Malware

D.

Buffer overflow

Buy Now
Questions 94

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?

Options:

A.

RPC

B.

IDLE

C.

UDP

D.

TCP SYN/ACK

Buy Now
Questions 95

John, a novice web user, makes a new E-mail account and keeps his password as " apple " , his favorite fruit. John ' s password is vulnerable to which of the following password cracking attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Hybrid attack

B.

Rule based attack

C.

Dictionary attack

D.

Brute Force attack

Buy Now
Questions 96

Which of the following ensures that a party to a dispute cannot deny the authenticity of their signature on a document or the sending of a message that they originated?

Options:

A.

OS fingerprinting

B.

Reconnaissance

C.

Non-repudiation

D.

Confidentiality

Buy Now
Questions 97

You execute the following netcat command:

c:\target\nc -1 -p 53 -d -e cmd.exe

What action do you want to perform by issuing the above command?

Options:

A.

Listen the incoming data and performing port scanning

B.

Capture data on port 53 and performing banner grabbing

C.

Capture data on port 53 and delete the remote shell

D.

Listen the incoming traffic on port 53 and execute the remote shell

Buy Now
Questions 98

Fill in the blank with the appropriate term.

______ is a technique used to make sure that incoming packets are actually from the networks that they claim to be from.

Options:

Buy Now
Exam Code: SEC504
Exam Name: Hacker Tools, Techniques, Exploits and Incident Handling
Last Update: Apr 30, 2026
Questions: 328

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now SEC504 testing engine

PDF (Q&A)

$43.57  $124.49
buy now SEC504 pdf