Real SANS SEC504 Exam Dumps

What can SEC504 Hacker Tools, Techniques, Exploits and Incident Handling can help you? It can help you understand attackers’ tactics and strategies in detail, give you hands-on experience in finding vulnerabilities and discovering intrusions, and equip you with a comprehensive incident handling plan. So how to pass your SANS SEC504 exam. Just choose real SANS SEC504 exam dumps as the preparation materials for passing Hacker Tools, Techniques, Exploits and Incident Handling exam at the first attempt.

Test SEC-504 Exam Online, You Can Find Real SEC504 Exam Dumps Are Good For You.

1. Which of the following statements about Denial-of-Service (DoS) attack are true?
Each correct answer represents a complete solution. Choose three.

2. Adam, a malicious hacker, wants to perform a reliable scan against a remote target. He is not concerned about being stealth at this point.
Which of the following type of scans would be most accurate and reliable?

3. Which of the following statements about a Trojan horse are true?
Each correct answer represents a complete solution. Choose two.

4. In which of the following attacking methods does an attacker distribute incorrect IP address?

5. Which of the following types of attacks is mounted with the objective of causing a negative impact on the performance of a computer or network?

6. John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He performs Web vulnerability scanning on the We­are-secure server. The output of the scanning test is as follows:
C:whisker.pl -h target_IP_address
-- whisker / v1.4.0 / rain forest puppy / www.wiretrip.net -- = - = - = - = - =
= Host: target_IP_address
= Server: Apache/1.3.12 (Win32) ApacheJServ/1.1
mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22
+ 200 OK: HEAD /cgi-bin/printenv
John recognizes /cgi-bin/printenv vulnerability ('Printenv' vulnerability) in the We_are_secure server. Which of the following statements about 'Printenv' vulnerability are true?
Each correct answer represents a complete solution. Choose all that apply.

7. Which of the following tools can be used for steganography?
Each correct answer represents a complete solution. Choose all that apply.

8. Which of the following tools is an automated tool that is used to implement SQL injections and to retrieve data from Web server databases?

9. Which of the following attacks come under the category of layer 2 Denial-of-Service attacks?
Each correct answer represents a complete solution. Choose all that apply.

10. Which of the following tools can be used to perform brute force attack on a remote database?
Each correct answer represents a complete solution. Choose all that apply.

11. Which of the following are the primary goals of the incident handling team?
Each correct answer represents a complete solution. Choose all that apply.

12. You see the career section of a company's Web site and analyze the job profile requirements. You conclude that the company wants professionals who have a sharp knowledge of Windows server 2003 and Windows active directory installation and placement. Which of the following steps are you using to perform hacking?

13. You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single domain single forest network. The company has three Windows 2008 file servers, 150 Windows XP Professional, thirty UNIX-based client computers. The network users have identical user accounts for both Active Directory and the UNIX realm. You want to ensure that the UNIX clients on the network can access the file servers. You also want to ensure that the users are able to access all resources by logging on only once, and that no additional software is installed on the UNIX clients. What will you do to accomplish this task?
Each correct answer represents a part of the solution. Choose two.

14. You work as a Network Administrator for InformSec Inc. You find that the TCP port number 23476 is open on your server. You suspect that there may be a Trojan named Donald Dick installed on your server. Now you want to verify whether Donald Dick is installed on it or not. For this, you want to know the process running on port 23476, as well as the process id, process name, and the path of the process on your server. Which of the following applications will you most likely use to accomplish the task?

15. Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?

16. You check performance logs and note that there has been a recent dramatic increase in the amount of broadcast traffic. What is this most likely to be an indicator of?

17. Which of the following statements about buffer overflow is true?

18. Buffer overflows are one of the major errors used for exploitation on the Internet today. A buffer overflow occurs when a particular operation/function writes more data into a variable than the variable was designed to hold.
Which of the following are the two popular types of buffer overflows?
Each correct answer represents a complete solution. Choose two.

19. Maria works as a professional Ethical Hacker. She is assigned a project to test the security of www.we-are-secure.com. She wants to test a DoS attack on the We-are-secure server. She finds that the firewall of the server is blocking the ICMP messages, but it is not checking the UDP packets. Therefore, she sends a large amount of UDP echo request traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the We-are-secure server. Which of the following DoS attacks is Maria using to accomplish her task?

20. Which of the following attacks is specially used for cracking a password?


 

Add a Comment

Your email address will not be published. Required fields are marked *