Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free SANS SEC504 Practice Exam with Questions & Answers

Questions 1

Which of the following are countermeasures to prevent unauthorized database access attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Session encryption

B.

Removing all stored procedures

C.

Applying strong firewall rules

D.

Input sanitization

SANS SEC504 Premium Access
Questions 2

In which of the following malicious hacking steps does email tracking come under?

Options:
A.

Reconnaissance

B.

Gaining access

C.

Maintaining Access

D.

Scanning

Questions 3

Which of the following tools is used to attack the Digital Watermarking?

Options:
A.

Active Attacks

B.

2Mosaic

C.

Steg-Only Attack

D.

Gifshuffle

Questions 4

You are the Administrator for a corporate network. You are concerned about denial of service attacks.

Which of the following measures would be most helpful in defending against a Denial-of-Service (DoS) attack?

Options:
A.

Implement network based antivirus.

B.

Place a honey pot in the DMZ.

C.

Shorten the timeout for connection attempts.

D.

Implement a strong password policy.

Questions 5

Which of the following systems is used in the United States to coordinate emergency preparedness and incident management among various federal, state, and local agencies?

Options:
A.

US Incident Management System (USIMS)

B.

National Disaster Management System (NDMS)

C.

National Emergency Management System (NEMS)

D.

National Incident Management System (NIMS)

Questions 6

In which of the following attacks does an attacker spoof the source address in IP packets that are sent to the victim?

Options:
A.

Dos

B.

DDoS

C.

Backscatter

D.

SQL injection

Questions 7

Which of the following reads and writes data across network connections by using the TCP/IP protocol?

Options:
A.

Fpipe

B.

NSLOOKUP

C.

Netcat

D.

2Mosaic

Questions 8

You work as a Security Administrator for Net Perfect Inc. The company has a Windows-based network. You want to use a scanning technique which works as a reconnaissance attack. The technique should direct to a specific host or network to determine the services that the host offers.

Which of the following scanning techniques can you use to accomplish the task?

Options:
A.

IDLE scan

B.

Nmap

C.

SYN scan

D.

Host port scan

Questions 9

You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution?

Each correct answer represents a part of the solution. Choose all that apply.

Options:
A.

Eradication

B.

Contamination

C.

Preparation

D.

Recovery

E.

Identification

Questions 10

Which of the following rootkits patches, hooks, or replaces system calls with versions that hide information about the attacker?

Options:
A.

Library rootkit

B.

Kernel level rootkit

C.

Hypervisor rootkit

D.

Boot loader rootkit

Exam Code: SEC504
Certification Provider: SANS
Exam Name: Hacker Tools, Techniques, Exploits and Incident Handling
Last Update: Sep 12, 2025
Questions: 328

SANS Free Exams

SANS Free Exams
Elevate your SANS exam preparation with free access to high-quality resources at Examstrack.