SANS SEC504 - Hacker Tools, Techniques, Exploits and Incident Handling
Which of the following rootkits patches, hooks, or replaces system calls with versions that hide information about the attacker?
Which of the following statements is true about the difference between worms and Trojan horses?
Which of the following programs can be used to detect stealth port scans performed by a malicious hacker?
Each correct answer represents a complete solution. Choose all that apply.
Fill in the blank with the appropriate term.
______ is a technique used to make sure that incoming packets are actually from the networks that they claim to be from.
Which of the following protocol loggers is used to detect ping sweep?
Victor is a novice Ethical Hacker. He is learning the hacking process, i.e., the steps taken by malicious hackers to perform hacking. Which of the following steps is NOT included in the hacking process?
Which of the following controls is described in the statement given below?
"It ensures that the enforcement of organizational security policy does not rely on voluntary web application user compliance. It secures information by assigning sensitivity labels on information and comparing this to the level of security a user is operating at."
You want to create an SSH tunnel for POP and SMTP protocols. Which of the following commands will you run?
OutGuess is used for __________ attack.
Which of the following types of channels is used by Trojans for communication?
