Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

PDF SEC504 Study Guide

Page: 3 / 12
Total 328 questions

Hacker Tools, Techniques, Exploits and Incident Handling Questions and Answers

Question 9

Which of the following statements about smurf is true?

Options:

A.

It is a UDP attack that involves spoofing and flooding.

B.

It is an ICMP attack that involves spoofing and flooding.

C.

It is an attack with IP fragments that cannot be reassembled.

D.

It is a denial of service (DoS) attack that leaves TCP ports open.

Question 10

You want to use PGP files for steganography. Which of the following tools will you use to accomplish the task?

Options:

A.

Blindside

B.

Snow

C.

ImageHide

D.

Stealth

Question 11

Which of the following steps of incident response is steady in nature?

Options:

A.

Containment

B.

Eradication

C.

Preparation

D.

Recovery

Question 12

Which of the following types of scan does not open a full TCP connection?

Options:

A.

FIN scan

B.

ACK scan

C.

Stealth scan

D.

Idle scan

Page: 3 / 12
Total 328 questions