Pass the SANS Certified Incident Handler SEC504 Questions and answers with CertsForce

Viewing page 8 out of 10 pages
Viewing questions 71-80 out of questions
Questions # 71:

Which of the following viruses/worms uses the buffer overflow attack?

Options:

A.

Chernobyl (CIH) virus


B.

Nimda virus


C.

Klez worm


D.

Code red worm


Expert Solution
Questions # 72:

Mark works as a Network Administrator for Perfect Inc. The company has both wired and wireless networks. An attacker attempts to keep legitimate users from accessing services that they require. Mark uses IDS/IPS sensors on the wired network to mitigate the attack. Which of the following attacks best describes the attacker's intentions?

Options:

A.

Internal attack


B.

Reconnaissance attack


C.

Land attack


D.

DoS attack


Expert Solution
Questions # 73:

In which of the following methods does an hacker use packet sniffing to read network traffic between two parties to steal the session cookies?

Options:

A.

Cross-site scripting


B.

Physical accessing


C.

Session fixation


D.

Session sidejacking


Expert Solution
Questions # 74:

Which of the following nmap command parameters is used for TCP SYN port scanning?

Options:

A.

-sF


B.

-sU


C.

-sX


D.

-sS


Expert Solution
Questions # 75:

Which of the following can be used to perform session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Cross-site scripting


B.

Session fixation


C.

ARP spoofing


D.

Session sidejacking


Expert Solution
Questions # 76:

Which of the following attacks can be overcome by applying cryptography?

Options:

A.

Buffer overflow


B.

Web ripping


C.

Sniffing


D.

DoS


Expert Solution
Questions # 77:

Which of the following is a type of computer security vulnerability typically found in Web applications that allow code injection by malicious Web users into the Web pages viewed by other users?

Options:

A.

SID filtering


B.

Cookie poisoning


C.

Cross-site scripting


D.

Privilege Escalation


Expert Solution
Questions # 78:

Which of the following US Acts emphasized a "risk-based policy for cost-effective security" and makes mandatory for agency program officials, chief information officers, and inspectors general (IGs) to conduct annual reviews of the agency's information security program and report the results to Office of Management and Budget?

Options:

A.

The Electronic Communications Privacy Act of 1986 (ECPA)


B.

The Fair Credit Reporting Act (FCRA)


C.

The Equal Credit Opportunity Act (ECOA)


D.

Federal Information Security Management Act of 2002 (FISMA)


Expert Solution
Questions # 79:

Fill in the blank with the appropriate name of the rootkit.

A _______ rootkit uses device or platform firmware to create a persistent malware image.


Expert Solution
Questions # 80:

You enter the netstat -an command in the command prompt and you receive intimation that port number 7777 is open on your computer. Which of the following Trojans may be installed on your computer?

Options:

A.

NetBus


B.

QAZ


C.

Donald Dick


D.

Tini


Expert Solution
Viewing page 8 out of 10 pages
Viewing questions 71-80 out of questions