SANS SEC504 - Hacker Tools, Techniques, Exploits and Incident Handling
Which of the following is the method of hiding data within another media type such as graphic or document?
Which of the following protocols uses only User Datagram Protocol (UDP)?
In which of the following attacks does an attacker use packet sniffing to read network traffic between two parties to steal the session cookie?
Which of the following is the Web 2.0 programming methodology that is used to create Web pages that are dynamic and interactive?
Maria works as the Chief Security Officer for PassGuide Inc. She wants to send secret messages to the CEO of the company. To secure these messages, she uses a technique of hiding a secret message within an ordinary message. The technique provides 'security through obscurity'. What technique is Maria using?
Which of the following statements about buffer overflow are true?
Each correct answer represents a complete solution. Choose two.
Which of the following techniques can be used to map 'open' or 'pass through' ports on a gateway?
Which of the following tools is used for port scanning?
John works as a C programmer. He develops the following C program:
#include
#include
#include
int buffer(char *str) {
char buffer1[10];
strcpy(buffer1, str);
return 1;
}
int main(int argc, char *argv[]) {
buffer (argv[1]);
printf("Executed\n");
return 1;
}
His program is vulnerable to a __________ attack.
Which of the following applications automatically calculates cryptographic hashes of all key system files that are to be monitored for modifications?
