Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free SANS SEC504 Practice Exam with Questions & Answers | Set: 2

Questions 11

Which of the following viruses/worms uses the buffer overflow attack?

Options:
A.

Chernobyl (CIH) virus

B.

Nimda virus

C.

Klez worm

D.

Code red worm

SANS SEC504 Premium Access
Questions 12

Which of the following is a technique for creating Internet maps?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Active Probing

B.

AS PATH Inference

C.

Object Relational Mapping

D.

Network Quota

Questions 13

Which of the following is a type of computer security vulnerability typically found in Web applications that allow code injection by malicious Web users into the Web pages viewed by other users?

Options:
A.

SID filtering

B.

Cookie poisoning

C.

Cross-site scripting

D.

Privilege Escalation

Questions 14

Which of the following is a version of netcat with integrated transport encryption capabilities?

Options:
A.

Encat

B.

Nikto

C.

Socat

D.

Cryptcat

Questions 15

Which of the following rootkits is used to attack against full disk encryption systems?

Options:
A.

Boot loader rootkit

B.

Library rootkit

C.

Hypervisor rootkit

D.

Kernel level rootkit

Questions 16

Which of the following is executed when a predetermined event occurs?

Options:
A.

Trojan horse

B.

Logic bomb

C.

MAC

D.

Worm

Questions 17

What is the purpose of configuring a password protected screen saver on a computer?

Options:
A.

For preventing unauthorized access to a system.

B.

For preventing a system from a Denial of Service (DoS) attack.

C.

For preventing a system from a social engineering attack.

D.

For preventing a system from a back door attack.

Questions 18

A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?

Options:
A.

Vulnerability attack

B.

Impersonation attack

C.

Social Engineering attack

D.

Denial-of-Service attack

Questions 19

Adam, a malicious hacker is sniffing the network to inject ARP packets. He injects broadcast frames onto the wire to conduct Man-in-The-Middle attack.

Which of the following is the destination MAC address of a broadcast frame?

Options:
A.

0xDDDDDDDDD

B.

0x00000000000

C.

0xFFFFFFFFFFFF

D.

0xAAAAAAAAAA

Questions 20

You enter the netstat -an command in the command prompt and you receive intimation that port number 7777 is open on your computer. Which of the following Trojans may be installed on your computer?

Options:
A.

NetBus

B.

QAZ

C.

Donald Dick

D.

Tini

Exam Code: SEC504
Certification Provider: SANS
Exam Name: Hacker Tools, Techniques, Exploits and Incident Handling
Last Update: Sep 12, 2025
Questions: 328

SANS Free Exams

SANS Free Exams
Elevate your SANS exam preparation with free access to high-quality resources at Examstrack.