Pass the SANS Certified Incident Handler SEC504 Questions and answers with CertsForce

Viewing page 10 out of 10 pages
Viewing questions 91-100 out of questions
Questions # 91:

Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration. The tool uses raw IP packets to determine the following:

What ports are open on our network systems.

What hosts are available on the network.

Identify unauthorized wireless access points.

What services (application name and version) those hosts are offering.

What operating systems (and OS versions) they are running.

What type of packet filters/firewalls are in use.

Which of the following tools is Victor using?

Options:

A.

Nessus


B.

Kismet


C.

Nmap


D.

Sniffer


Expert Solution
Questions # 92:

Which of the following statements about reconnaissance is true?

Options:

A.

It describes an attempt to transfer DNS zone data.


B.

It is a computer that is used to attract potential intruders or attackers.


C.

It is any program that allows a hacker to connect to a computer without going through the normal authentication process.


D.

It is also known as half-open scanning.


Expert Solution
Questions # 93:

In which of the following malicious hacking steps does email tracking come under?

Options:

A.

Reconnaissance


B.

Gaining access


C.

Maintaining Access


D.

Scanning


Expert Solution
Questions # 94:

James works as a Database Administrator for Techsoft Inc. The company has a SQL Server 2005 computer. The computer has a database named Sales. Users complain that the performance of the database has deteriorated. James opens the System Monitor tool and finds that there is an increase in network traffic. What kind of attack might be the cause of the performance deterioration?

Options:

A.

Denial-of-Service


B.

Injection


C.

Internal attack


D.

Virus


Expert Solution
Questions # 95:

You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?

Options:

A.

Nmap


B.

Ethereal


C.

Ettercap


D.

Netcraft


Expert Solution
Questions # 96:

What is the purpose of configuring a password protected screen saver on a computer?

Options:

A.

For preventing unauthorized access to a system.


B.

For preventing a system from a Denial of Service (DoS) attack.


C.

For preventing a system from a social engineering attack.


D.

For preventing a system from a back door attack.


Expert Solution
Questions # 97:

Which of the following are the automated tools that are used to perform penetration testing?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Pwdump


B.

Nessus


C.

EtherApe


D.

GFI LANguard


Expert Solution
Questions # 98:

Which of the following statements is true about the difference between worms and Trojan horses?

Options:

A.

Trojan horses are a form of malicious codes while worms are not.


B.

Trojan horses are harmful to computers while worms are not.


C.

Worms can be distributed through emails while Trojan horses cannot.


D.

Worms replicate themselves while Trojan horses do not.


Expert Solution
Viewing page 10 out of 10 pages
Viewing questions 91-100 out of questions