Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free SANS SEC504 Practice Exam with Questions & Answers | Set: 6

Questions 51

Which of the following types of attacks is only intended to make a computer resource unavailable to its users?

Options:
A.

Denial of Service attack

B.

Replay attack

C.

Teardrop attack

D.

Land attack

SANS SEC504 Premium Access
Questions 52

Which of the following commands is used to access Windows resources from Linux workstation?

Options:
A.

mutt

B.

scp

C.

rsync

D.

smbclient

Questions 53

Your network is being flooded by ICMP packets. When you trace them down they come from multiple different IP addresses. What kind of attack is this?

Options:
A.

Syn flood

B.

Ping storm

C.

Smurf attack

D.

DDOS

Questions 54

Which of the following tools can be used for steganography?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Image hide

B.

Stegbreak

C.

Snow.exe

D.

Anti-x

Questions 55

An attacker sends a large number of packets to a target computer that causes denial of service.

Which of the following type of attacks is this?

Options:
A.

Spoofing

B.

Snooping

C.

Phishing

D.

Flooding

Questions 56

What is the major difference between a worm and a Trojan horse?

Options:
A.

A worm spreads via e-mail, while a Trojan horse does not.

B.

A worm is a form of malicious program, while a Trojan horse is a utility.

C.

A worm is self replicating, while a Trojan horse is not.

D.

A Trojan horse is a malicious program, while a worm is an anti-virus software.

Questions 57

Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?

Options:
A.

Piggybacking

B.

Hacking

C.

Session hijacking

D.

Keystroke logging

Questions 58

Adam works as an Incident Handler for Umbrella Inc. His recent actions towards the incident are not up to the standard norms of the company. He always forgets some steps and procedures while handling responses as they are very hectic to perform.

Which of the following steps should Adam take to overcome this problem with the least administrative effort?

Options:
A.

Create incident manual read it every time incident occurs.

B.

Appoint someone else to check the procedures.

C.

Create incident checklists.

D.

Create new sub-team to keep check.

Questions 59

Which of the following tools is an automated tool that is used to implement SQL injections and to retrieve data from Web server databases?

Options:
A.

Fragroute

B.

Absinthe

C.

Stick

D.

ADMutate

Questions 60

Which of the following statements about a Trojan horse are true?

Each correct answer represents a complete solution. Choose two.

Options:
A.

It is a macro or script that attaches itself to a file or template.

B.

The writers of a Trojan horse can use it later to gain unauthorized access to a computer.

C.

It is a malicious software program code that resembles another normal program.

D.

It infects the boot record on hard disks and floppy disks.

Exam Code: SEC504
Certification Provider: SANS
Exam Name: Hacker Tools, Techniques, Exploits and Incident Handling
Last Update: Sep 12, 2025
Questions: 328

SANS Free Exams

SANS Free Exams
Elevate your SANS exam preparation with free access to high-quality resources at Examstrack.