Pass4itsure > SANS > Certified Incident Handler > SEC504 > SEC504 Online Practice Questions and Answers

SEC504 Online Practice Questions and Answers

Questions 4

Many organizations create network maps of their network system to visualize the network and understand the relationship between the end devices and the transport layer that provide services.

Which of the following are the techniques used for network mapping by large organizations? Each correct answer represents a complete solution. Choose three.

A. Packet crafting

B. Route analytics

C. SNMP-based approaches

D. Active Probing

Buy Now
Questions 5

Your network is being flooded by ICMP packets. When you trace them down they come from multiple different IP addresses. What kind of attack is this?

A. Syn flood

B. Ping storm

C. Smurf attack

D. DDOS

Buy Now
Questions 6

Which of the following DoS attacks affects mostly Windows computers by sending corrupt UDP packets?

A. Fraggle

B. Ping flood

C. Bonk

D. Smurf

Buy Now
Questions 7

James works as a Database Administrator for Techsoft Inc. The company has a SQL Server 2005 computer. The computer has a database named Sales. Users complain that the performance of the database has deteriorated. James opens the System Monitor tool and finds that there is an increase in network traffic.

What kind of attack might be the cause of the performance deterioration?

A. Denial-of-Service

B. Injection

C. Internal attack

D. Virus

Buy Now
Questions 8

Mark works as a Network Administrator for Perfect Inc. The company has both wired and wireless networks. An attacker attempts to keep legitimate users from accessing services that they require. Mark uses IDS/IPS sensors on the wired network to mitigate the attack.

Which of the following attacks best describes the attacker's intentions?

A. Internal attack

B. Reconnaissance attack

C. Land attack

D. DoS attack

Buy Now
Questions 9

You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you.

Which of the following stages in the Incident handling process involves your decision making?

A. Identification

B. Containment

C. Eradication

D. Preparation

Buy Now
Questions 10

Which of the following US Acts emphasized a "risk-based policy for cost-effective security" and makes mandatory for agency program officials, chief information officers, and inspectors general (IGs) to conduct annual reviews of the agency's information security program and report the results to Office of Management and Budget?

A. The Electronic Communications Privacy Act of 1986 (ECPA)

B. The Fair Credit Reporting Act (FCRA)

C. The Equal Credit Opportunity Act (ECOA)

D. Federal Information Security Management Act of 2002 (FISMA)

Buy Now
Questions 11

Which of the following is used to determine the range of IP addresses that are mapped to a live hosts?

A. Port sweep

B. Ping sweep

C. IP sweep

D. Telnet sweep

Buy Now
Questions 12

Which of the following is an Internet mapping technique that relies on various BGP collectors that collect information such as routing updates and tables and provide this information publicly?

A. AS Route Inference

B. Path MTU discovery (PMTUD)

C. AS PATH Inference

D. Firewalking

Buy Now
Questions 13

John works as a Professional Ethical Hacker for NetPerfect Inc. The company has a Linux- based network. All client computers are running on Red Hat 7.0 Linux. The Sales Manager of the company complains to John that his system contains an unknown package named as tar.gz and his documents are exploited. To resolve the problem, John uses a Port scanner to enquire about the open ports and finds out that the HTTP server service port on 27374 is open. He suspects that the other computers on the network are also facing the same problem. John discovers that a malicious application is using the synscan tool to randomly generate IP addresses.

Which of the following worms has attacked the computer?

A. Code red

B. Ramen

C. LoveLetter

D. Nimda

Buy Now
Exam Code: SEC504
Exam Name: Hacker Tools, Techniques, Exploits and Incident Handling
Last Update: Apr 30, 2024
Questions: 328
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99