SANS SEC504 - Hacker Tools, Techniques, Exploits and Incident Handling
Which of the following are the primary goals of the incident handling team?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following is spy software that records activity on Macintosh systems via snapshots, keystrokes, and Web site logging?
Which of the following tools is used for vulnerability scanning and calls Hydra to launch a dictionary attack?
Which of the following types of attacks is only intended to make a computer resource unavailable to its users?
In which of the following attacking methods does an attacker distribute incorrect IP address?
Which of the following statements about a Trojan horse are true?
Each correct answer represents a complete solution. Choose two.
Which of the following statements about buffer overflow is true?
You run the following command while using Nikto Web scanner:
perl nikto.pl -h 192.168.0.1 -p 443
What action do you want to perform?
