Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free SANS SEC504 Practice Exam with Questions & Answers | Set: 3

Questions 21

Victor wants to send an encrypted message to his friend. He is using certain steganography technique to accomplish this task. He takes a cover object and changes it accordingly to hide information. This secret information is recovered only when the algorithm compares the changed cover with the original cover.

Which of the following Steganography methods is Victor using to accomplish the task?

Options:
A.

The distortion technique

B.

The spread spectrum technique

C.

The substitution technique

D.

The cover generation technique

SANS SEC504 Premium Access
Questions 22

In which of the following methods does an hacker use packet sniffing to read network traffic between two parties to steal the session cookies?

Options:
A.

Cross-site scripting

B.

Physical accessing

C.

Session fixation

D.

Session sidejacking

Questions 23

Which of the following statements is true about the difference between worms and Trojan horses?

Options:
A.

Trojan horses are a form of malicious codes while worms are not.

B.

Trojan horses are harmful to computers while worms are not.

C.

Worms can be distributed through emails while Trojan horses cannot.

D.

Worms replicate themselves while Trojan horses do not.

Questions 24

In which of the following attacks does the attacker gather information to perform an access attack?

Options:
A.

Land attack

B.

Reconnaissance attack

C.

Vulnerability attack

D.

DoS attack

Questions 25

Which of the following services CANNOT be performed by the nmap utility?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Passive OS fingerprinting

B.

Sniffing

C.

Active OS fingerprinting

D.

Port scanning

Questions 26

Which of the following keyloggers cannot be detected by anti-virus or anti-spyware products?

Options:
A.

Kernel keylogger

B.

Software keylogger

C.

Hardware keylogger

D.

OS keylogger

Questions 27

Mark works as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. The company uses Check Point SmartDefense to provide security to the network. Mark uses SmartDefense on the HTTP servers of the company to fix the limitation for the maximum response header length. Which of the following attacks can be blocked by defining this limitation?

Options:
A.

HTR Overflow worms and mutations

B.

Ramen worm attack

C.

Melissa virus attack

D.

Shoulder surfing attack

Questions 28

Which of the following tools will you use to prevent from session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

OpenSSH

B.

Rlogin

C.

Telnet

D.

SSL

Questions 29

Mark works as a Network Administrator for NetTech Inc. The network has 150 Windows 2000 Professional client computers and four Windows 2000 servers. All the client computers are able to connect to the Internet. Mark is concerned about malware infecting the client computers through the Internet. What will Mark do to protect the client computers from malware?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Educate users of the client computers to avoid malware.

B.

Educate users of the client computers about the problems arising due to malware.

C.

Prevent users of the client computers from executing any programs.

D.

Assign Read-Only permission to the users for accessing the hard disk drives of the client computers.

Questions 30

John works as a Penetration Tester in a security service providing firm named you-are-secure Inc. Recently, John's company has got a project to test the security of a promotional Website www.missatlanta.com and assigned the pen-testing work to John. When John is performing penetration testing, he inserts the following script in the search box at the company home page:

<script>alert('Hi, John')</script>

After pressing the search button, a pop-up box appears on his screen with the text - "Hi, John." Which of the following attacks can be performed on the Web site tested by john while considering the above scenario?

Options:
A.

Replay attack

B.

CSRF attack

C.

Buffer overflow attack

D.

XSS attack

Exam Code: SEC504
Certification Provider: SANS
Exam Name: Hacker Tools, Techniques, Exploits and Incident Handling
Last Update: Sep 12, 2025
Questions: 328

SANS Free Exams

SANS Free Exams
Elevate your SANS exam preparation with free access to high-quality resources at Examstrack.