New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

SANS SEC504 - Hacker Tools, Techniques, Exploits and Incident Handling

Page: 4 / 10
Total 328 questions

Which of the following rootkits patches, hooks, or replaces system calls with versions that hide information about the attacker?

A.

Library rootkit

B.

Kernel level rootkit

C.

Hypervisor rootkit

D.

Boot loader rootkit

Which of the following statements is true about the difference between worms and Trojan horses?

A.

Trojan horses are a form of malicious codes while worms are not.

B.

Trojan horses are harmful to computers while worms are not.

C.

Worms can be distributed through emails while Trojan horses cannot.

D.

Worms replicate themselves while Trojan horses do not.

Which of the following programs can be used to detect stealth port scans performed by a malicious hacker?

Each correct answer represents a complete solution. Choose all that apply.

A.

nmap

B.

scanlogd

C.

libnids

D.

portsentry

Fill in the blank with the appropriate term.

______ is a technique used to make sure that incoming packets are actually from the networks that they claim to be from.

Which of the following protocol loggers is used to detect ping sweep?

A.

lppi

B.

pitl

C.

dpsl

D.

ippl

Victor is a novice Ethical Hacker. He is learning the hacking process, i.e., the steps taken by malicious hackers to perform hacking. Which of the following steps is NOT included in the hacking process?

A.

Scanning

B.

Preparation

C.

gaining access

D.

Reconnaissance

Which of the following controls is described in the statement given below?

"It ensures that the enforcement of organizational security policy does not rely on voluntary web application user compliance. It secures information by assigning sensitivity labels on information and comparing this to the level of security a user is operating at."

A.

Role-based Access Control

B.

Attribute-based Access Control

C.

Discretionary Access Control

D.

Mandatory Access Control

You want to create an SSH tunnel for POP and SMTP protocols. Which of the following commands will you run?

A.

ssh -L 110:mailhost:110 -L 25

B.

ssh -L 110:mailhost:110 -L 25:mailhost:25 -1

C.

ssh -L 25:mailhost:110 -L 110

D.

ssh -L 110:mailhost:110 -L 25:mailhost:25 -1 user -N mailhost

OutGuess is used for __________ attack.

A.

Steganography

B.

Web password cracking

C.

SQL injection

D.

Man-in-the-middle

Which of the following types of channels is used by Trojans for communication?

A.

Loop channel

B.

Open channel

C.

Covert channel

D.

Overt channel