Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Selected SEC504 Certified Incident Handler Questions Answers

Page: 2 / 12
Total 328 questions

Hacker Tools, Techniques, Exploits and Incident Handling Questions and Answers

Question 5

You discover that all available network bandwidth is being used by some unknown service. You discover that UDP packets are being used to connect the echo service on one machine to the chargen service on another machine. What kind of attack is this?

Options:

A.

Smurf

B.

Denial of Service

C.

Evil Twin

D.

Virus

Question 6

Which of the following IP packet elements is responsible for authentication while using IPSec?

Options:

A.

Authentication Header (AH)

B.

Layer 2 Tunneling Protocol (L2TP)

C.

Internet Key Exchange (IKE)

D.

Encapsulating Security Payload (ESP)

Question 7

Which of the following are the limitations for the cross site request forgery (CSRF) attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The attacker must determine the right values for all the form inputs.

B.

The attacker must target a site that doesn't check the referrer header.

C.

The target site should have limited lifetime authentication cookies.

D.

The target site should authenticate in GET and POST parameters, not only cookies.

Question 8

Which of the following tools can be used for network sniffing as well as for intercepting conversations through session hijacking?

Options:

A.

Ethercap

B.

Tripwire

C.

IPChains

D.

Hunt

Page: 2 / 12
Total 328 questions