Pass the SANS Certified Incident Handler SEC504 Questions and answers with CertsForce

Viewing page 6 out of 10 pages
Viewing questions 51-60 out of questions
Questions # 51:

Which of the following types of attacks slows down or stops a server by overloading it with requests?

Options:

A.

DoS attack


B.

Impersonation attack


C.

Network attack


D.

Vulnerability attack


Expert Solution
Questions # 52:

Alice wants to prove her identity to Bob. Bob requests her password as proof of identity, which Alice dutifully provides (possibly after some transformation like a hash function); meanwhile, Eve is eavesdropping the conversation and keeps the password. After the interchange is over, Eve connects to Bob posing as Alice; when asked for a proof of identity, Eve sends Alice's password read from the last session, which Bob accepts. Which of the following attacks is being used by Eve?

Options:

A.

Replay


B.

Firewalking


C.

Session fixation


D.

Cross site scripting


Expert Solution
Questions # 53:

Maria works as the Chief Security Officer for PassGuide Inc. She wants to send secret messages to the CEO of the company. To secure these messages, she uses a technique of hiding a secret message within an ordinary message. The technique provides 'security through obscurity'. What technique is Maria using?

Options:

A.

Steganography


B.

Public-key cryptography


C.

RSA algorithm


D.

Encryption


Expert Solution
Questions # 54:

Which of the following are used to identify who is responsible for responding to an incident?

Options:

A.

Disaster management policies


B.

Incident response manuals


C.

Disaster management manuals


D.

Incident response policies


Expert Solution
Questions # 55:

Which of the following attacks capture the secret value like a hash and reuse it later to gain access to a system without ever decrypting or decoding the hash?

Options:

A.

Cross Site Scripting attack


B.

Replay attack


C.

Rainbow attack


D.

Hashing attack


Expert Solution
Questions # 56:

Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform a user must install a packet capture library.

What is the name of this library?

Options:

A.

PCAP


B.

SysPCap


C.

WinPCap


D.

libpcap


Expert Solution
Questions # 57:

Which of the following statements about smurf is true?

Options:

A.

It is a UDP attack that involves spoofing and flooding.


B.

It is an ICMP attack that involves spoofing and flooding.


C.

It is an attack with IP fragments that cannot be reassembled.


D.

It is a denial of service (DoS) attack that leaves TCP ports open.


Expert Solution
Questions # 58:

Which of the following tools is used for port scanning?

Options:

A.

NSLOOKUP


B.

NETSH


C.

Nmap


D.

L0phtcrack


Expert Solution
Questions # 59:

Which of the following tasks can be performed by using netcat utility?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Checking file integrity


B.

Creating a Backdoor


C.

Firewall testing


D.

Port scanning and service identification


Expert Solution
Questions # 60:

Which of the following steps of incident response is steady in nature?

Options:

A.

Containment


B.

Eradication


C.

Preparation


D.

Recovery


Expert Solution
Viewing page 6 out of 10 pages
Viewing questions 51-60 out of questions