Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

SEC504 Exam Dumps - SANS Certified Incident Handler Questions and Answers

Question # 4

Firekiller 2000 is an example of a __________.

Options:

A.

Security software disabler Trojan

B.

DoS attack Trojan

C.

Data sending Trojan

D.

Remote access Trojan

Buy Now
Question # 5

Which of the following is used to gather information about a remote network protected by a firewall?

Options:

A.

Warchalking

B.

Wardialing

C.

Firechalking

D.

Firewalking

Buy Now
Question # 6

Which of the following types of malware does not replicate itself but can spread only when the circumstances are beneficial?

Options:

A.

Mass mailer

B.

Worm

C.

Blended threat

D.

Trojan horse

Buy Now
Question # 7

Fill in the blank with the appropriate term.

______ is a free Unix subsystem that runs on top of Windows.

Options:

Buy Now
Question # 8

Which of the following terms describes an attempt to transfer DNS zone data?

Options:

A.

Reconnaissance

B.

Encapsulation

C.

Dumpster diving

D.

Spam

Buy Now
Question # 9

Which of the following is the best method of accurately identifying the services running on a victim host?

Options:

A.

Use of the manual method of telnet to each of the open ports.

B.

Use of a port scanner to scan each port to confirm the services running.

C.

Use of hit and trial method to guess the services and ports of the victim host.

D.

Use of a vulnerability scanner to try to probe each port to verify which service is running.

Buy Now
Question # 10

You work as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. The company wants to fix potential vulnerabilities existing on the tested systems. You use Nessus as a vulnerability scanning program to fix the vulnerabilities. Which of the following vulnerabilities can be fixed using Nessus?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Misconfiguration (e.g. open mail relay, missing patches, etc.)

B.

Vulnerabilities that allow a remote cracker to control sensitive data on a system

C.

Vulnerabilities that allow a remote cracker to access sensitive data on a system

D.

Vulnerabilities that help in Code injection attacks

Buy Now
Question # 11

Adam works as a Network Administrator for PassGuide Inc. He wants to prevent the network from DOS attacks. Which of the following is most useful against DOS attacks?

Options:

A.

SPI

B.

Distributive firewall

C.

Honey Pot

D.

Internet bot

Buy Now
Question # 12

Which of the following methods can be used to detect session hijacking attack?

Options:

A.

nmap

B.

Brutus

C.

ntop

D.

sniffer

Buy Now
Question # 13

Which of the following is a computer worm that caused a denial of service on some Internet hosts and dramatically slowed down general Internet traffic?

Options:

A.

Klez

B.

Code red

C.

SQL Slammer

D.

Beast

Buy Now
Exam Code: SEC504
Exam Name: Hacker Tools, Techniques, Exploits and Incident Handling
Last Update: Aug 24, 2025
Questions: 328
SEC504 pdf

SEC504 PDF

$25.5  $84.99
SEC504 Engine

SEC504 Testing Engine

$28.5  $94.99
SEC504 PDF + Engine

SEC504 PDF + Testing Engine

$40.5  $134.99