Pass the SANS Certified Incident Handler SEC504 Questions and answers with CertsForce

Viewing page 9 out of 10 pages
Viewing questions 81-90 out of questions
Questions # 81:

Which of the following services CANNOT be performed by the nmap utility?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Passive OS fingerprinting


B.

Sniffing


C.

Active OS fingerprinting


D.

Port scanning


Expert Solution
Questions # 82:

Which of the following can be used as a Trojan vector to infect an information system?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

NetBIOS remote installation


B.

Any fake executable


C.

Spywares and adware


D.

ActiveX controls, VBScript, and Java scripts


Expert Solution
Questions # 83:

Which of the following rootkits is able to load the original operating system as a virtual machine, thereby enabling it to intercept all hardware calls made by the original operating system?

Options:

A.

Kernel level rootkit


B.

Boot loader rootkit


C.

Hypervisor rootkit


D.

Library rootkit


Expert Solution
Questions # 84:

Which of the following tools uses common UNIX/Linux tools like the strings and grep commands to search core system programs for signatures of the rootkits?

Options:

A.

rkhunter


B.

OSSEC


C.

chkrootkit


D.

Blue Pill


Expert Solution
Questions # 85:

Adam is a novice Web user. He chooses a 22 letters long word from the dictionary as his password.

How long will it take to crack the password by an attacker?

Options:

A.

22 hours


B.

23 days


C.

200 years


D.

5 minutes


Expert Solution
Questions # 86:

Which of the following is a version of netcat with integrated transport encryption capabilities?

Options:

A.

Encat


B.

Nikto


C.

Socat


D.

Cryptcat


Expert Solution
Questions # 87:

Which of the following systems is used in the United States to coordinate emergency preparedness and incident management among various federal, state, and local agencies?

Options:

A.

US Incident Management System (USIMS)


B.

National Disaster Management System (NDMS)


C.

National Emergency Management System (NEMS)


D.

National Incident Management System (NIMS)


Expert Solution
Questions # 88:

You are hired as a Database Administrator for Jennifer Shopping Cart Inc. You monitor the server health through the System Monitor and found that there is a sudden increase in the number of logins.

Which of the following types of attack has occurred?

Options:

A.

Injection


B.

Virus


C.

Worm


D.

Denial-of-service


Expert Solution
Questions # 89:

Mark works as a Network Administrator for NetTech Inc. The network has 150 Windows 2000 Professional client computers and four Windows 2000 servers. All the client computers are able to connect to the Internet. Mark is concerned about malware infecting the client computers through the Internet. What will Mark do to protect the client computers from malware?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Educate users of the client computers to avoid malware.


B.

Educate users of the client computers about the problems arising due to malware.


C.

Prevent users of the client computers from executing any programs.


D.

Assign Read-Only permission to the users for accessing the hard disk drives of the client computers.


Expert Solution
Questions # 90:

Which of the following terms describes an attempt to transfer DNS zone data?

Options:

A.

Reconnaissance


B.

Encapsulation


C.

Dumpster diving


D.

Spam


Expert Solution
Viewing page 9 out of 10 pages
Viewing questions 81-90 out of questions