Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Certified Incident Handler SEC504 Dumps PDF

Page: 4 / 12
Total 328 questions

Hacker Tools, Techniques, Exploits and Incident Handling Questions and Answers

Question 13

Which of the following scanning tools is also a network analysis tool that sends packets with nontraditional IP stack parameters and allows the scanner to gather information from the response packets generated?

Options:

A.

Tcpview

B.

Nessus

C.

Legion

D.

HPing

Question 14

Brutus is a password cracking tool that can be used to crack the following authentications:

l HTTP (Basic Authentication)

l HTTP (HTML Form/CGI)

l POP3 (Post Office Protocol v3)

l FTP (File Transfer Protocol)

l SMB (Server Message Block)

l Telnet

Which of the following attacks can be performed by Brutus for password cracking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Hybrid attack

B.

Replay attack

C.

Dictionary attack

D.

Brute force attack

E.

Man-in-the-middle attack

Question 15

Maria works as a professional Ethical Hacker. She has been assigned the project of testing the security of She is using dumpster diving to gather information about Gentech Inc.

In which of the following steps of malicious hacking does dumpster diving come under?

Options:

A.

Multi-factor authentication

B.

Role-based access control

C.

Mutual authentication

D.

Reconnaissance

Question 16

You are concerned about rootkits on your network communicating with attackers outside your network. Without using an IDS how can you detect this sort of activity?

Options:

A.

By examining your domain controller server logs.

B.

You cannot, you need an IDS.

C.

By examining your firewall logs.

D.

By setting up a DMZ.

Page: 4 / 12
Total 328 questions