Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Pass SEC504 Exam Guide

Page: 7 / 12
Total 328 questions

Hacker Tools, Techniques, Exploits and Incident Handling Questions and Answers

Question 25

Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration. The tool uses raw IP packets to determine the following:

What ports are open on our network systems.

What hosts are available on the network.

Identify unauthorized wireless access points.

What services (application name and version) those hosts are offering.

What operating systems (and OS versions) they are running.

What type of packet filters/firewalls are in use.

Which of the following tools is Victor using?

Options:

A.

Nessus

B.

Kismet

C.

Nmap

D.

Sniffer

Question 26

Adam is a novice Web user. He chooses a 22 letters long word from the dictionary as his password.

How long will it take to crack the password by an attacker?

Options:

A.

22 hours

B.

23 days

C.

200 years

D.

5 minutes

Question 27

Which of the following tools is used to attack the Digital Watermarking?

Options:

A.

Active Attacks

B.

2Mosaic

C.

Steg-Only Attack

D.

Gifshuffle

Question 28

Mark works as a Network Administrator for NetTech Inc. The network has 150 Windows 2000 Professional client computers and four Windows 2000 servers. All the client computers are able to connect to the Internet. Mark is concerned about malware infecting the client computers through the Internet. What will Mark do to protect the client computers from malware?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Educate users of the client computers to avoid malware.

B.

Educate users of the client computers about the problems arising due to malware.

C.

Prevent users of the client computers from executing any programs.

D.

Assign Read-Only permission to the users for accessing the hard disk drives of the client computers.

Page: 7 / 12
Total 328 questions