Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

SEC504 Exam Dumps - SANS Certified Incident Handler Questions and Answers

Question # 24

Which of the following are countermeasures to prevent unauthorized database access attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Session encryption

B.

Removing all stored procedures

C.

Applying strong firewall rules

D.

Input sanitization

Buy Now
Question # 25

You have forgotten your password of an online shop. The web application of that online shop asks you to enter your email so that they can send you a new password. You enter your email

you@gmail.com

And press the submit button.

The Web application displays the server error. What can be the reason of the error?

Options:

A.

You have entered any special character in email.

B.

Email entered is not valid.

C.

The remote server is down.

D.

Your internet connection is slow.

Buy Now
Question # 26

Which of the following are based on malicious code?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Denial-of-Service (DoS)

B.

Biometrics

C.

Trojan horse

D.

Worm

Buy Now
Question # 27

Adam works as a Security Administrator for Umbrella Technology Inc. He reported a breach in security to his senior members, stating that "security defenses has been breached and exploited for 2 weeks by hackers." The hackers had accessed and downloaded 50,000 addresses containing customer credit cards and passwords. Umbrella Technology was looking to law enforcement officials to protect their intellectual property.

The intruder entered through an employee's home machine, which was connected to Umbrella Technology's corporate VPN network. The application called BEAST Trojan was used in the attack to open a "back door" allowing the hackers undetected access. The security breach was discovered when customers complained about the usage of their credit cards without their knowledge.

The hackers were traced back to Shanghai, China through e-mail address evidence. The credit card information was sent to that same e-mail address. The passwords allowed the hackers to access Umbrella Technology's network from a remote location, posing as employees.

Which of the following actions can Adam perform to prevent such attacks from occurring in future?

Options:

A.

Allow VPN access but replace the standard authentication with biometric authentication

B.

Replace the VPN access with dial-up modem access to the company's network

C.

Disable VPN access to all employees of the company from home machines

D.

Apply different security policy to make passwords of employees more complex

Buy Now
Question # 28

Which of the following techniques can be used to map 'open' or 'pass through' ports on a gateway?

Options:

A.

Traceport

B.

Tracefire

C.

Tracegate

D.

Traceroute

Buy Now
Question # 29

Peter works as a Network Administrator for the PassGuide Inc. The company has a Windows-based network. All client computers run the Windows XP operating system. The employees of the company complain that suddenly all of the client computers have started working slowly. Peter finds that a malicious hacker is attempting to slow down the computers by flooding the network with a large number of requests. Which of the following attacks is being implemented by the malicious hacker?

Options:

A.

SQL injection attack

B.

Denial-of-Service (DoS) attack

C.

Man-in-the-middle attack

D.

Buffer overflow attack

Buy Now
Question # 30

Which of the following steps can be taken as countermeasures against sniffer attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Use encrypted protocols for all communications.

B.

Use switches instead of hubs since they switch communications, which means that information is delivered only to the predefined host.

C.

Use tools such as StackGuard and Immunix System to avoid attacks.

D.

Reduce the range of the network to avoid attacks into wireless networks.

Buy Now
Question # 31

Which of the following is used to determine the operating system on the remote computer in a network environment?

Options:

A.

Spoofing

B.

Reconnaissance

C.

OS Fingerprinting

D.

Social engineering

Buy Now
Question # 32

Which of the following protocols uses only User Datagram Protocol (UDP)?

Options:

A.

POP3

B.

FTP

C.

ICMP

D.

TFTP

Buy Now
Question # 33

Which of the following provides packet-level encryption between hosts in a LAN?

Options:

A.

PPTP

B.

IPsec

C.

PFS

D.

Tunneling protocol

Buy Now
Exam Code: SEC504
Exam Name: Hacker Tools, Techniques, Exploits and Incident Handling
Last Update: Aug 24, 2025
Questions: 328
SEC504 pdf

SEC504 PDF

$25.5  $84.99
SEC504 Engine

SEC504 Testing Engine

$28.5  $94.99
SEC504 PDF + Engine

SEC504 PDF + Testing Engine

$40.5  $134.99