Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

SEC504 Exam Dumps - SANS Certified Incident Handler Questions and Answers

Question # 34

Which of the following techniques does an attacker use to sniff data frames on a local area network and modify the traffic?

Options:

A.

MAC spoofing

B.

IP address spoofing

C.

Email spoofing

D.

ARP spoofing

Buy Now
Question # 35

Firewalking is a technique that can be used to gather information about a remote network protected by a firewall. This technique can be used effectively to perform information gathering attacks. In this technique, an attacker sends a crafted packet with a TTL value that is set to expire one hop past the firewall. Which of the following are pre-requisites for an attacker to conduct firewalking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

An attacker should know the IP address of a host located behind the firewall.

B.

ICMP packets leaving the network should be allowed.

C.

There should be a backdoor installed on the network.

D.

An attacker should know the IP address of the last known gateway before the firewall.

Buy Now
Question # 36

John works as a Network Administrator for We-are-secure Inc. He finds that TCP port 7597 of the Weare- secure server is open. He suspects that it may be open due to a Trojan installed on the server. He presents a report to the company describing the symptoms of the Trojan. A summary of the report is given below:

Once this Trojan has been installed on the computer, it searches Notpad.exe, renames it Note.com, and then copies itself to the computer as Notepad.exe. Each time Notepad.exe is executed, the Trojan executes and calls the original Notepad to avoid being noticed.

Which of the following Trojans has the symptoms as the one described above?

Options:

A.

NetBus

B.

Qaz

C.

eBlaster

D.

SubSeven

Buy Now
Question # 37

Mark works as a Network Administrator for Perfect Inc. The company has both wired and wireless networks. An attacker attempts to keep legitimate users from accessing services that they require. Mark uses IDS/IPS sensors on the wired network to mitigate the attack. Which of the following attacks best describes the attacker's intentions?

Options:

A.

Internal attack

B.

Reconnaissance attack

C.

Land attack

D.

DoS attack

Buy Now
Question # 38

Which of the following functions in c/c++ can be the cause of buffer overflow?

Each correct answer represents a complete solution. Choose two.

Options:

A.

printf()

B.

strcat()

C.

strcpy()

D.

strlength()

Buy Now
Question # 39

Which of the following tools can be used as penetration tools in the Information system auditing process?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Nmap

B.

Snort

C.

SARA

D.

Nessus

Buy Now
Question # 40

In which of the following attacks does an attacker spoof the source address in IP packets that are sent to the victim?

Options:

A.

Dos

B.

DDoS

C.

Backscatter

D.

SQL injection

Buy Now
Question # 41

You check performance logs and note that there has been a recent dramatic increase in the amount of broadcast traffic. What is this most likely to be an indicator of?

Options:

A.

Virus

B.

Syn flood

C.

Misconfigured router

D.

DoS attack

Buy Now
Question # 42

Which of the following is a network worm that exploits the RPC sub-system vulnerability present in the Microsoft Windows operating system?

Options:

A.

Win32/Agent

B.

WMA/TrojanDownloader.GetCodec

C.

Win32/Conflicker

D.

Win32/PSW.OnLineGames

Buy Now
Question # 43

Ryan, a malicious hacker submits Cross-Site Scripting (XSS) exploit code to the Website of Internet forum for online discussion. When a user visits the infected Web page, code gets automatically executed and Ryan can easily perform acts like account hijacking, history theft etc. Which of the following types of Cross-Site Scripting attack Ryan intends to do?

Options:

A.

Non persistent

B.

Document Object Model (DOM)

C.

SAX

D.

Persistent

Buy Now
Exam Code: SEC504
Exam Name: Hacker Tools, Techniques, Exploits and Incident Handling
Last Update: Aug 24, 2025
Questions: 328
SEC504 pdf

SEC504 PDF

$25.5  $84.99
SEC504 Engine

SEC504 Testing Engine

$28.5  $94.99
SEC504 PDF + Engine

SEC504 PDF + Testing Engine

$40.5  $134.99