New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

SANS SEC504 - Hacker Tools, Techniques, Exploits and Incident Handling

Page: 6 / 10
Total 328 questions

Which of the following is the method of hiding data within another media type such as graphic or document?

A.

Spoofing

B.

Steganography

C.

Packet sniffing

D.

Cryptanalysis

Which of the following protocols uses only User Datagram Protocol (UDP)?

A.

POP3

B.

FTP

C.

ICMP

D.

TFTP

In which of the following attacks does an attacker use packet sniffing to read network traffic between two parties to steal the session cookie?

A.

Session fixation

B.

Cross-site scripting

C.

Session sidejacking

D.

ARP spoofing

Which of the following is the Web 2.0 programming methodology that is used to create Web pages that are dynamic and interactive?

A.

UML

B.

Ajax

C.

RSS

D.

XML

Maria works as the Chief Security Officer for PassGuide Inc. She wants to send secret messages to the CEO of the company. To secure these messages, she uses a technique of hiding a secret message within an ordinary message. The technique provides 'security through obscurity'. What technique is Maria using?

A.

Steganography

B.

Public-key cryptography

C.

RSA algorithm

D.

Encryption

Which of the following statements about buffer overflow are true?

Each correct answer represents a complete solution. Choose two.

A.

It is a situation that occurs when a storage device runs out of space.

B.

It is a situation that occurs when an application receives more data than it is configured to accept.

C.

It can improve application performance.

D.

It can terminate an application.

Which of the following techniques can be used to map 'open' or 'pass through' ports on a gateway?

A.

Traceport

B.

Tracefire

C.

Tracegate

D.

Traceroute

Which of the following tools is used for port scanning?

A.

NSLOOKUP

B.

NETSH

C.

Nmap

D.

L0phtcrack

John works as a C programmer. He develops the following C program:

#include

#include

#include

int buffer(char *str) {

char buffer1[10];

strcpy(buffer1, str);

return 1;

}

int main(int argc, char *argv[]) {

buffer (argv[1]);

printf("Executed\n");

return 1;

}

His program is vulnerable to a __________ attack.

A.

SQL injection

B.

Denial-of-Service

C.

Buffer overflow

D.

Cross site scripting

Which of the following applications automatically calculates cryptographic hashes of all key system files that are to be monitored for modifications?

A.

Tripwire

B.

TCPView

C.

PrcView

D.

Inzider