New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

SANS SEC504 - Hacker Tools, Techniques, Exploits and Incident Handling

Page: 3 / 10
Total 328 questions

You work as a Network Penetration tester in the Secure Inc. Your company takes the projects to test the security of various companies. Recently, Secure Inc. has assigned you a project to test the security of a Web site. You go to the Web site login page and you run the following SQL query:

SELECT email, passwd, login_id, full_name

FROM members

WHERE email = 'attacker@somehwere.com'; DROP TABLE members; --'

What task will the above SQL query perform?

A.

Deletes the database in which members table resides.

B.

Deletes the rows of members table where email id is 'attacker@somehwere.com' given.

C.

Performs the XSS attacks.

D.

Deletes the entire members table.

Which of the following rootkits is able to load the original operating system as a virtual machine, thereby enabling it to intercept all hardware calls made by the original operating system?

A.

Kernel level rootkit

B.

Boot loader rootkit

C.

Hypervisor rootkit

D.

Library rootkit

Which of the following keyloggers cannot be detected by anti-virus or anti-spyware products?

A.

Kernel keylogger

B.

Software keylogger

C.

Hardware keylogger

D.

OS keylogger

John works as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. The company uses Check Point SmartDefense to provide security to the network of the company. On the HTTP servers of the company, John defines a rule for dropping any kind of userdefined URLs. Which of the following types of attacks can be prevented by dropping the user-defined URLs?

A.

Morris worm

B.

Code red worm

C.

Hybrid attacks

D.

PTC worms and mutations

Which of the following statements are true about Dsniff?

Each correct answer represents a complete solution. Choose two.

A.

It contains Trojans.

B.

It is a virus.

C.

It is antivirus.

D.

It is a collection of various hacking tools.

You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?

A.

Nmap

B.

Ethereal

C.

Ettercap

D.

Netcraft

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the task:

1. Smoothening and decreasing contrast by averaging the pixels of the area where significant color transitions occurs.

2. Reducing noise by adjusting color and averaging pixel value.

3. Sharpening, Rotating, Resampling, and Softening the image.

Which of the following Steganography attacks is Victor using?

A.

Stegdetect Attack

B.

Chosen-Stego Attack

C.

Steg-Only Attack

D.

Active Attacks

Which of the following is a technique for creating Internet maps?

Each correct answer represents a complete solution. Choose two.

A.

Active Probing

B.

AS PATH Inference

C.

Object Relational Mapping

D.

Network Quota

Which of the following are countermeasures to prevent unauthorized database access attacks?

Each correct answer represents a complete solution. Choose all that apply.

A.

Session encryption

B.

Removing all stored procedures

C.

Applying strong firewall rules

D.

Input sanitization

John works as a Penetration Tester in a security service providing firm named you-are-secure Inc. Recently, John's company has got a project to test the security of a promotional Website www.missatlanta.com and assigned the pen-testing work to John. When John is performing penetration testing, he inserts the following script in the search box at the company home page:

<script>alert('Hi, John')</script>

After pressing the search button, a pop-up box appears on his screen with the text - "Hi, John." Which of the following attacks can be performed on the Web site tested by john while considering the above scenario?

A.

Replay attack

B.

CSRF attack

C.

Buffer overflow attack

D.

XSS attack