Summer Special Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 60certs

SANS SEC504 Dumps

Page: 1 / 12
Total 328 questions

Hacker Tools, Techniques, Exploits and Incident Handling Questions and Answers

Question 1

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

Options:

A.

Email spoofing

B.

Steganography

C.

Web ripping

D.

Social engineering

Question 2

Alice wants to prove her identity to Bob. Bob requests her password as proof of identity, which Alice dutifully provides (possibly after some transformation like a hash function); meanwhile, Eve is eavesdropping the conversation and keeps the password. After the interchange is over, Eve connects to Bob posing as Alice; when asked for a proof of identity, Eve sends Alice's password read from the last session, which Bob accepts. Which of the following attacks is being used by Eve?

Options:

A.

Replay

B.

Firewalking

C.

Session fixation

D.

Cross site scripting

Question 3

Which of the following is the most common vulnerability that can affect desktop applications written in native code?

Options:

A.

SpyWare

B.

DDoS attack

C.

Malware

D.

Buffer overflow

Question 4

John works as a C programmer. He develops the following C program:

#include

#include

#include

int buffer(char *str) {

char buffer1[10];

strcpy(buffer1, str);

return 1;

}

int main(int argc, char *argv[]) {

buffer (argv[1]);

printf("Executed\n");

return 1;

}

His program is vulnerable to a __________ attack.

Options:

A.

SQL injection

B.

Denial-of-Service

C.

Buffer overflow

D.

Cross site scripting

Question 5

You discover that all available network bandwidth is being used by some unknown service. You discover that UDP packets are being used to connect the echo service on one machine to the chargen service on another machine. What kind of attack is this?

Options:

A.

Smurf

B.

Denial of Service

C.

Evil Twin

D.

Virus

Question 6

Which of the following IP packet elements is responsible for authentication while using IPSec?

Options:

A.

Authentication Header (AH)

B.

Layer 2 Tunneling Protocol (L2TP)

C.

Internet Key Exchange (IKE)

D.

Encapsulating Security Payload (ESP)

Question 7

Which of the following are the limitations for the cross site request forgery (CSRF) attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The attacker must determine the right values for all the form inputs.

B.

The attacker must target a site that doesn't check the referrer header.

C.

The target site should have limited lifetime authentication cookies.

D.

The target site should authenticate in GET and POST parameters, not only cookies.

Question 8

Which of the following tools can be used for network sniffing as well as for intercepting conversations through session hijacking?

Options:

A.

Ethercap

B.

Tripwire

C.

IPChains

D.

Hunt

Question 9

Which of the following statements about smurf is true?

Options:

A.

It is a UDP attack that involves spoofing and flooding.

B.

It is an ICMP attack that involves spoofing and flooding.

C.

It is an attack with IP fragments that cannot be reassembled.

D.

It is a denial of service (DoS) attack that leaves TCP ports open.

Question 10

You want to use PGP files for steganography. Which of the following tools will you use to accomplish the task?

Options:

A.

Blindside

B.

Snow

C.

ImageHide

D.

Stealth

Question 11

Which of the following steps of incident response is steady in nature?

Options:

A.

Containment

B.

Eradication

C.

Preparation

D.

Recovery

Question 12

Which of the following types of scan does not open a full TCP connection?

Options:

A.

FIN scan

B.

ACK scan

C.

Stealth scan

D.

Idle scan

Question 13

Which of the following scanning tools is also a network analysis tool that sends packets with nontraditional IP stack parameters and allows the scanner to gather information from the response packets generated?

Options:

A.

Tcpview

B.

Nessus

C.

Legion

D.

HPing

Question 14

Brutus is a password cracking tool that can be used to crack the following authentications:

l HTTP (Basic Authentication)

l HTTP (HTML Form/CGI)

l POP3 (Post Office Protocol v3)

l FTP (File Transfer Protocol)

l SMB (Server Message Block)

l Telnet

Which of the following attacks can be performed by Brutus for password cracking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Hybrid attack

B.

Replay attack

C.

Dictionary attack

D.

Brute force attack

E.

Man-in-the-middle attack

Question 15

Maria works as a professional Ethical Hacker. She has been assigned the project of testing the security of She is using dumpster diving to gather information about Gentech Inc.

In which of the following steps of malicious hacking does dumpster diving come under?

Options:

A.

Multi-factor authentication

B.

Role-based access control

C.

Mutual authentication

D.

Reconnaissance

Question 16

You are concerned about rootkits on your network communicating with attackers outside your network. Without using an IDS how can you detect this sort of activity?

Options:

A.

By examining your domain controller server logs.

B.

You cannot, you need an IDS.

C.

By examining your firewall logs.

D.

By setting up a DMZ.

Question 17

Which of the following are based on malicious code?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Denial-of-Service (DoS)

B.

Biometrics

C.

Trojan horse

D.

Worm

Question 18

Which of the following keyloggers cannot be detected by anti-virus or anti-spyware products?

Options:

A.

Kernel keylogger

B.

Software keylogger

C.

Hardware keylogger

D.

OS keylogger

Question 19

Which of the following statements is true about the difference between worms and Trojan horses?

Options:

A.

Trojan horses are a form of malicious codes while worms are not.

B.

Trojan horses are harmful to computers while worms are not.

C.

Worms can be distributed through emails while Trojan horses cannot.

D.

Worms replicate themselves while Trojan horses do not.

Question 20

Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65,536 bytes. On the basis of above information, which of the following types of attack is Adam attempting to perform?

Options:

A.

Fraggle attack

B.

Ping of death attack

C.

SYN Flood attack

D.

Land attack

Question 21

Which of the following systems is used in the United States to coordinate emergency preparedness and incident management among various federal, state, and local agencies?

Options:

A.

US Incident Management System (USIMS)

B.

National Disaster Management System (NDMS)

C.

National Emergency Management System (NEMS)

D.

National Incident Management System (NIMS)

Question 22

You send SYN packets with the exact TTL of the target system starting at port 1 and going up to port 1024 using hping2 utility. This attack is known as __________.

Options:

A.

Port scanning

B.

Cloaking

C.

Firewalking

D.

Spoofing

Question 23

Which of the following rootkits patches, hooks, or replaces system calls with versions that hide information about the attacker?

Options:

A.

Library rootkit

B.

Kernel level rootkit

C.

Hypervisor rootkit

D.

Boot loader rootkit

Question 24

Which of the following statements are true about Dsniff?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It contains Trojans.

B.

It is a virus.

C.

It is antivirus.

D.

It is a collection of various hacking tools.

Question 25

Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration. The tool uses raw IP packets to determine the following:

What ports are open on our network systems.

What hosts are available on the network.

Identify unauthorized wireless access points.

What services (application name and version) those hosts are offering.

What operating systems (and OS versions) they are running.

What type of packet filters/firewalls are in use.

Which of the following tools is Victor using?

Options:

A.

Nessus

B.

Kismet

C.

Nmap

D.

Sniffer

Question 26

Adam is a novice Web user. He chooses a 22 letters long word from the dictionary as his password.

How long will it take to crack the password by an attacker?

Options:

A.

22 hours

B.

23 days

C.

200 years

D.

5 minutes

Question 27

Which of the following tools is used to attack the Digital Watermarking?

Options:

A.

Active Attacks

B.

2Mosaic

C.

Steg-Only Attack

D.

Gifshuffle

Question 28

Mark works as a Network Administrator for NetTech Inc. The network has 150 Windows 2000 Professional client computers and four Windows 2000 servers. All the client computers are able to connect to the Internet. Mark is concerned about malware infecting the client computers through the Internet. What will Mark do to protect the client computers from malware?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Educate users of the client computers to avoid malware.

B.

Educate users of the client computers about the problems arising due to malware.

C.

Prevent users of the client computers from executing any programs.

D.

Assign Read-Only permission to the users for accessing the hard disk drives of the client computers.

Question 29

Which of the following types of malware does not replicate itself but can spread only when the circumstances are beneficial?

Options:

A.

Mass mailer

B.

Worm

C.

Blended threat

D.

Trojan horse

Question 30

Which of the following tools will you use to prevent from session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

OpenSSH

B.

Rlogin

C.

Telnet

D.

SSL

Question 31

You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Eradication

B.

Contamination

C.

Preparation

D.

Recovery

E.

Identification

Question 32

Firekiller 2000 is an example of a __________.

Options:

A.

Security software disabler Trojan

B.

DoS attack Trojan

C.

Data sending Trojan

D.

Remote access Trojan

Question 33

Which of the following is a version of netcat with integrated transport encryption capabilities?

Options:

A.

Encat

B.

Nikto

C.

Socat

D.

Cryptcat

Question 34

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Linguistic steganography

B.

Perceptual masking

C.

Technical steganography

D.

Text Semagrams

Question 35

Which of the following malicious software travels across computer networks without the assistance of a user?

Options:

A.

Worm

B.

Virus

C.

Hoax

D.

Trojan horses

Question 36

Which of the following tools can be used to detect the steganography?

Options:

A.

Dskprobe

B.

Blindside

C.

ImageHide

D.

Snow

Question 37

In which of the following scanning methods do Windows operating systems send only RST packets irrespective of whether the port is open or closed?

Options:

A.

TCP FIN

B.

FTP bounce

C.

XMAS

D.

TCP SYN

Question 38

Which of the following statements are true about tcp wrappers?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

tcp wrapper provides access control, host address spoofing, client username lookups, etc.

B.

When a user uses a TCP wrapper, the inetd daemon runs the wrapper program tcpd instead of running the server program directly.

C.

tcp wrapper allows host or subnetwork IP addresses, names and/or ident query replies, to be used as tokens to filter for access control purposes.

D.

tcp wrapper protects a Linux server from IP address spoofing.

Question 39

Adam, a malicious hacker is running a scan. Statistics of the scan is as follows:

Scan directed at open port: ClientServer

192.5.2.92:4079 ---------FIN--------->192.5.2.110:23192.5.2.92:4079 <----NO RESPONSE---

---192.5.2.110:23

Scan directed at closed port:

ClientServer

192.5.2.92:4079 ---------FIN--------->192.5.2.110:23

192.5.2.92:4079<-----RST/ACK----------192.5.2.110:23

Which of the following types of port scan is Adam running?

Options:

A.

ACK scan

B.

FIN scan

C.

XMAS scan

D.

Idle scan

Question 40

Adam works as an Incident Handler for Umbrella Inc. His recent actions towards the incident are not up to the standard norms of the company. He always forgets some steps and procedures while handling responses as they are very hectic to perform.

Which of the following steps should Adam take to overcome this problem with the least administrative effort?

Options:

A.

Create incident manual read it every time incident occurs.

B.

Appoint someone else to check the procedures.

C.

Create incident checklists.

D.

Create new sub-team to keep check.

Question 41

Fill in the blank with the appropriate word.

StackGuard (as used by Immunix), ssp/ProPolice (as used by OpenBSD), and Microsoft's /GS option use ______ defense against buffer overflow attacks.

Options:

Question 42

Which of the following attacks is specially used for cracking a password?

Options:

A.

PING attack

B.

Dictionary attack

C.

Vulnerability attack

D.

DoS attack

Question 43

Which of the following statements are true about netcat?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It provides special tunneling, such as UDP to TCP, with the possibility of specifying all network parameters.

B.

It can be used as a file transfer solution.

C.

It provides outbound and inbound connections for TCP and UDP ports.

D.

The nc -z command can be used to redirect stdin/stdout from a program.

Question 44

Which of the following types of attack can guess a hashed password?

Options:

A.

Brute force attack

B.

Evasion attack

C.

Denial of Service attack

D.

Teardrop attack

Question 45

Which of the following is a network worm that exploits the RPC sub-system vulnerability present in the Microsoft Windows operating system?

Options:

A.

Win32/Agent

B.

WMA/TrojanDownloader.GetCodec

C.

Win32/Conflicker

D.

Win32/PSW.OnLineGames

Question 46

Who are the primary victims of smurf attacks on the contemporary Internet system?

Options:

A.

IRC servers are the primary victims to smurf attacks

B.

FTP servers are the primary victims to smurf attacks

C.

SMTP servers are the primary victims to smurf attacks

D.

Mail servers are the primary victims to smurf attacks

Question 47

Which of the following tools is an automated tool that is used to implement SQL injections and to retrieve data from Web server databases?

Options:

A.

Fragroute

B.

Absinthe

C.

Stick

D.

ADMutate

Question 48

In which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536 bytes to the target system?

Options:

A.

Ping of death

B.

Jolt

C.

Fraggle

D.

Teardrop

Question 49

Which of the following statements are true about firewalking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

To use firewalking, the attacker needs the IP address of the last known gateway before the firewall and the IP address of a host located behind the firewall.

B.

In this technique, an attacker sends a crafted packet with a TTL value that is set to expire one hop past the firewall.

C.

A malicious attacker can use firewalking to determine the types of ports/protocols that can bypass the firewall.

D.

Firewalking works on the UDP packets.

Page: 1 / 12
Total 328 questions