Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free SANS SEC504 Practice Exam with Questions & Answers | Set: 8

Questions 71

Which of the following hacking tools provides shell access over ICMP?

Options:
A.

John the Ripper

B.

Nmap

C.

Nessus

D.

Loki

SANS SEC504 Premium Access
Questions 72

You discover that all available network bandwidth is being used by some unknown service. You discover that UDP packets are being used to connect the echo service on one machine to the chargen service on another machine. What kind of attack is this?

Options:
A.

Smurf

B.

Denial of Service

C.

Evil Twin

D.

Virus

Questions 73

Which of the following tools can be used for network sniffing as well as for intercepting conversations through session hijacking?

Options:
A.

Ethercap

B.

Tripwire

C.

IPChains

D.

Hunt

Questions 74

Which of the following are the rules by which an organization operates?

Options:
A.

Acts

B.

Policies

C.

Rules

D.

Manuals

Questions 75

Which of the following wireless network security solutions refers to an authentication process in which a user can connect wireless access points to a centralized server to ensure that all hosts are properly authenticated?

Options:
A.

Remote Authentication Dial-In User Service (RADIUS)

B.

IEEE 802.1x

C.

Wired Equivalent Privacy (WEP)

D.

Wi-Fi Protected Access 2 (WPA2)

Questions 76

You execute the following netcat command:

c:\target\nc -1 -p 53 -d -e cmd.exe

What action do you want to perform by issuing the above command?

Options:
A.

Listen the incoming data and performing port scanning

B.

Capture data on port 53 and performing banner grabbing

C.

Capture data on port 53 and delete the remote shell

D.

Listen the incoming traffic on port 53 and execute the remote shell

Questions 77

Your IDS discovers that an intruder has gained access to your system. You immediately stop that access, change passwords for administrative accounts, and secure your network. You discover an odd account (not administrative) that has permission to remotely access the network. What is this most likely?

Options:
A.

An example of privilege escalation.

B.

A normal account you simply did not notice before. Large networks have a number of accounts; it is hard to track them all.

C.

A backdoor the intruder created so that he can re-enter the network.

D.

An example of IP spoofing.

Questions 78

Adam works as a Security Analyst for Umbrella Inc. CEO of the company ordered him to implement two-factor authentication for the employees to access their networks. He has told him that he would like to use some type of hardware device in tandem with a security or identifying pin number. Adam decides to implement smart cards but they are not cost effective.

Which of the following types of hardware devices will Adam use to implement two-factor authentication?

Options:
A.

Biometric device

B.

Security token

C.

Proximity cards

D.

One Time Password

Questions 79

Which of the following attacks involves multiple compromised systems to attack a single target?

Options:
A.

Brute force attack

B.

Replay attack

C.

Dictionary attack

D.

DDoS attack

Questions 80

Which of the following IP packet elements is responsible for authentication while using IPSec?

Options:
A.

Authentication Header (AH)

B.

Layer 2 Tunneling Protocol (L2TP)

C.

Internet Key Exchange (IKE)

D.

Encapsulating Security Payload (ESP)

Exam Code: SEC504
Certification Provider: SANS
Exam Name: Hacker Tools, Techniques, Exploits and Incident Handling
Last Update: Sep 12, 2025
Questions: 328

SANS Free Exams

SANS Free Exams
Elevate your SANS exam preparation with free access to high-quality resources at Examstrack.