Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

SANS SEC504 - Hacker Tools, Techniques, Exploits and Incident Handling

Page: 1 / 10
Total 328 questions

Firekiller 2000 is an example of a __________.

A.

Security software disabler Trojan

B.

DoS attack Trojan

C.

Data sending Trojan

D.

Remote access Trojan

Which of the following netcat parameters makes netcat a listener that automatically restarts itself when a connection is dropped?

A.

-u

B.

-l

C.

-p

D.

-L

Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65,536 bytes. On the basis of above information, which of the following types of attack is Adam attempting to perform?

A.

Fraggle attack

B.

Ping of death attack

C.

SYN Flood attack

D.

Land attack

You work as a Network Administrator for Marioxnet Inc. You have the responsibility of handling two routers with BGP protocol for the enterprise's network. One of the two routers gets flooded with an unexpected number of data packets, while the other router starves with no packets reaching it. Which of the following attacks can be a potential cause of this?

A.

Packet manipulation

B.

Denial-of-Service

C.

Spoofing

D.

Eavesdropping

Which of the following programming languages are NOT vulnerable to buffer overflow attacks?

Each correct answer represents a complete solution. Choose two.

A.

C

B.

Java

C.

C++

D.

Perl

Which of the following attacks are examples of Denial-of-service attacks (DoS)?

Each correct answer represents a complete solution. Choose all that apply.

A.

Fraggle attack

B.

Smurf attack

C.

Birthday attack

D.

Ping flood attack

Which of the following can be used as a countermeasure against the SQL injection attack?

Each correct answer represents a complete solution. Choose two.

A.

mysql_real_escape_string()

B.

session_regenerate_id()

C.

mysql_escape_string()

D.

Prepared statement

You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?

A.

Identification

B.

Containment

C.

Eradication

D.

Preparation

Which of the following tools uses common UNIX/Linux tools like the strings and grep commands to search core system programs for signatures of the rootkits?

A.

rkhunter

B.

OSSEC

C.

chkrootkit

D.

Blue Pill

Which of the following functions in c/c++ can be the cause of buffer overflow?

Each correct answer represents a complete solution. Choose two.

A.

printf()

B.

strcat()

C.

strcpy()

D.

strlength()