Pass the SANS Certified Incident Handler SEC504 Questions and answers with CertsForce

Viewing page 2 out of 10 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following attacks is specially used for cracking a password?

Options:

A.

PING attack


B.

Dictionary attack


C.

Vulnerability attack


D.

DoS attack


Expert Solution
Questions # 12:

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. On the We-are-secure login page, he enters ='or''=' as a username and successfully logs in to the user page of the Web site.

The we-are-secure login page is vulnerable to a __________.

Options:

A.

Dictionary attack


B.

SQL injection attack


C.

Replay attack


D.

Land attack


Expert Solution
Questions # 13:

Which of the following are types of access control attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Spoofing


B.

Brute force attack


C.

Dictionary attack


D.

Mail bombing


Expert Solution
Questions # 14:

Maria works as a professional Ethical Hacker. She is assigned a project to test the security of www.we-are-secure.com. She wants to test a DoS attack on the We-are-secure server. She finds that the firewall of the server is blocking the ICMP messages, but it is not checking the UDP packets. Therefore, she sends a large amount of UDP echo request traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the We-are-secure server. Which of the following DoS attacks is Maria using to accomplish her task?

Options:

A.

Ping flood attack


B.

Fraggle DoS attack


C.

Teardrop attack


D.

Smurf DoS attack


Expert Solution
Questions # 15:

Which of the following statements are true about firewalking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

To use firewalking, the attacker needs the IP address of the last known gateway before the firewall and the IP address of a host located behind the firewall.


B.

In this technique, an attacker sends a crafted packet with a TTL value that is set to expire one hop past the firewall.


C.

A malicious attacker can use firewalking to determine the types of ports/protocols that can bypass the firewall.


D.

Firewalking works on the UDP packets.


Expert Solution
Questions # 16:

You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of security auditing. Recently, your company has assigned you a project to test the security of the we-aresecure.com Web site. For this, you want to perform the idle scan so that you can get the ports open in the we-are-secure.com server. You are using Hping tool to perform the idle scan by using a zombie computer. While scanning, you notice that every IPID is being incremented on every query, regardless whether the ports are open or close. Sometimes, IPID is being incremented by more than one value.

What may be the reason?

Options:

A.

The firewall is blocking the scanning process.


B.

The zombie computer is not connected to the we-are-secure.com Web server.


C.

The zombie computer is the system interacting with some other system besides your computer.


D.

Hping does not perform idle scanning.


Expert Solution
Questions # 17:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He finds that the We-are-secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against __________.

Options:

A.

IIS buffer overflow


B.

NetBIOS NULL session


C.

SNMP enumeration


D.

DNS zone transfer


Expert Solution
Questions # 18:

Which of the following is designed to protect the Internet resolvers (clients) from forged DNS data created by DNS cache poisoning?

Options:

A.

Stub resolver


B.

BINDER


C.

Split-horizon DNS


D.

Domain Name System Extension (DNSSEC)


Expert Solution
Questions # 19:

Many organizations create network maps of their network system to visualize the network and understand the relationship between the end devices and the transport layer that provide services.

Which of the following are the techniques used for network mapping by large organizations?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Packet crafting


B.

Route analytics


C.

SNMP-based approaches


D.

Active Probing


Expert Solution
Questions # 20:

Which of the following tools is an automated tool that is used to implement SQL injections and to retrieve data from Web server databases?

Options:

A.

Fragroute


B.

Absinthe


C.

Stick


D.

ADMutate


Expert Solution
Viewing page 2 out of 10 pages
Viewing questions 11-20 out of questions