Pass the SANS Certified Incident Handler SEC504 Questions and answers with CertsForce

Viewing page 7 out of 10 pages
Viewing questions 61-70 out of questions
Questions # 61:

Which of the following statements about threats are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

A threat is a weakness or lack of safeguard that can be exploited by vulnerability, thus causing harm to the information systems or networks.


B.

A threat is a potential for violation of security which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.


C.

A threat is a sequence of circumstances and events that allows a human or other agent to cause an information-related misfortune by exploiting vulnerability in an IT product.


D.

A threat is any circumstance or event with the potential of causing harm to a system in the form of destruction, disclosure, modification of data, or denial of service.


Expert Solution
Questions # 62:

You want to connect to your friend's computer and run a Trojan on it. Which of the following tools will you use to accomplish the task?

Options:

A.

PSExec


B.

Remoxec


C.

Hk.exe


D.

GetAdmin.exe


Expert Solution
Questions # 63:

John is a malicious attacker. He illegally accesses the server of We-are-secure Inc. He then places a backdoor in the We-are-secure server and alters its log files. Which of the following steps of malicious hacking includes altering the server log files?

Options:

A.

Maintaining access


B.

Covering tracks


C.

Gaining access


D.

Reconnaissance


Expert Solution
Questions # 64:

John works as a Professional Ethical Hacker for NetPerfect Inc. The company has a Linux-based network. All client computers are running on Red Hat 7.0 Linux. The Sales Manager of the company complains to John that his system contains an unknown package named as tar.gz and his documents are exploited. To resolve the problem, John uses a Port scanner to enquire about the open ports and finds out that the HTTP server service port on 27374 is open. He suspects that the other computers on the network are also facing the same problem. John discovers that a malicious application is using the synscan tool to randomly generate IP addresses.

Which of the following worms has attacked the computer?

Options:

A.

Code red


B.

Ramen


C.

LoveLetter


D.

Nimda


Expert Solution
Questions # 65:

Which of the following are based on malicious code?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Denial-of-Service (DoS)


B.

Biometrics


C.

Trojan horse


D.

Worm


Expert Solution
Questions # 66:

You enter the following URL on your Web browser:

http://www.we-are-secure.com/scripts/..%co%af../..%co%

af../windows/system32/cmd.exe?/c+dir+c:\

What kind of attack are you performing?

Options:

A.

Directory traversal


B.

Replay


C.

Session hijacking


D.

URL obfuscating


Expert Solution
Questions # 67:

In which of the following attacks does the attacker gather information to perform an access attack?

Options:

A.

Land attack


B.

Reconnaissance attack


C.

Vulnerability attack


D.

DoS attack


Expert Solution
Questions # 68:

In which of the following attacks does an attacker spoof the source address in IP packets that are sent to the victim?

Options:

A.

Dos


B.

DDoS


C.

Backscatter


D.

SQL injection


Expert Solution
Questions # 69:

Fill in the blank with the appropriate name of the attack.

______ takes best advantage of an existing authenticated connection


Expert Solution
Questions # 70:

Which of the following functions in c/c++ can be the cause of buffer overflow?

Each correct answer represents a complete solution. Choose two.

Options:

A.

printf()


B.

strcat()


C.

strcpy()


D.

strlength()


Expert Solution
Viewing page 7 out of 10 pages
Viewing questions 61-70 out of questions