Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

Hacker Tools, Techniques, Exploits and Incident Handling Question and Answers

Hacker Tools, Techniques, Exploits and Incident Handling

Last Update Oct 15, 2025
Total Questions : 328

We are offering FREE SEC504 SANS exam questions. All you do is to just go and sign up. Give your details, prepare SEC504 free exam questions and then go for complete pool of Hacker Tools, Techniques, Exploits and Incident Handling test questions that will help you more.

SEC504 pdf

SEC504 PDF

$42  $104.99
SEC504 Engine

SEC504 Testing Engine

$50  $124.99
SEC504 PDF + Engine

SEC504 PDF + Testing Engine

$66  $164.99
Questions 1

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare-secure.com. He is working on the Linux operating system. He wants to sniff the we-are-secure network and intercept a conversation between two employees of the company through session hijacking. Which of the following tools will John use to accomplish the task?

Options:

A.  

Hunt

B.  

IPChains

C.  

Ethercap

D.  

Tripwire

Discussion 0
Questions 2

Victor wants to send an encrypted message to his friend. He is using certain steganography technique to accomplish this task. He takes a cover object and changes it accordingly to hide information. This secret information is recovered only when the algorithm compares the changed cover with the original cover.

Which of the following Steganography methods is Victor using to accomplish the task?

Options:

A.  

The distortion technique

B.  

The spread spectrum technique

C.  

The substitution technique

D.  

The cover generation technique

Discussion 0
Questions 3

In which of the following attacks does the attacker gather information to perform an access attack?

Options:

A.  

Land attack

B.  

Reconnaissance attack

C.  

Vulnerability attack

D.  

DoS attack

Discussion 0
Questions 4

You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?

Options:

A.  

Nmap

B.  

Ethereal

C.  

Ettercap

D.  

Netcraft

Discussion 0
Questions 5

Which of the following programs can be used to detect stealth port scans performed by a malicious hacker?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

nmap

B.  

scanlogd

C.  

libnids

D.  

portsentry

Discussion 0
Questions 6

Which of the following are countermeasures to prevent unauthorized database access attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Session encryption

B.  

Removing all stored procedures

C.  

Applying strong firewall rules

D.  

Input sanitization

Discussion 0
Questions 7

Which of the following is executed when a predetermined event occurs?

Options:

A.  

Trojan horse

B.  

Logic bomb

C.  

MAC

D.  

Worm

Discussion 0
Questions 8

Which of the following can be used as a countermeasure against the SQL injection attack?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

mysql_real_escape_string()

B.  

session_regenerate_id()

C.  

mysql_escape_string()

D.  

Prepared statement

Discussion 0
Questions 9

Adam, a malicious hacker, wants to perform a reliable scan against a remote target. He is not concerned about being stealth at this point.

Which of the following type of scans would be most accurate and reliable?

Options:

A.  

UDP sacn

B.  

TCP Connect scan

C.  

ACK scan

D.  

Fin scan

Discussion 0
Questions 10

John works as a Professional Penetration Tester. He has been assigned a project to test the Website security of www.we-are-secure Inc. On the We-are-secure Website login page, he enters ='or''=' as a username and successfully logs on to the user page of the Web site. Now, John asks the we-aresecure Inc. to improve the login page PHP script. Which of the following suggestions can John give to improve the security of the we-are-secure Website login page from the SQL injection attack?

Options:

A.  

Use the escapeshellarg() function

B.  

Use the session_regenerate_id() function

C.  

Use the mysql_real_escape_string() function for escaping input

D.  

Use the escapeshellcmd() function

Discussion 0
Questions 11

Jason, a Malicious Hacker, is a student of Baker university. He wants to perform remote hacking on the server of DataSoft Inc. to hone his hacking skills. The company has a Windows-based network. Jason successfully enters the target system remotely by using the advantage of vulnerability. He places a Trojan to maintain future access and then disconnects the remote session. The employees of the company complain to Mark, who works as a Professional Ethical Hacker for DataSoft Inc., that some computers are very slow. Mark diagnoses the network and finds that some irrelevant log files and signs of Trojans are present on the computers. He suspects that a malicious hacker has accessed the network. Mark takes the help from Forensic Investigators and catches Jason.

Which of the following mistakes made by Jason helped the Forensic Investigators catch him?

Options:

A.  

Jason did not perform a vulnerability assessment.

B.  

Jason did not perform OS fingerprinting.

C.  

Jason did not perform foot printing.

D.  

Jason did not perform covering tracks.

E.  

Jason did not perform port scanning.

Discussion 0
Questions 12

Which of the following tools can be used for steganography?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Image hide

B.  

Stegbreak

C.  

Snow.exe

D.  

Anti-x

Discussion 0
Questions 13

Which of the following is designed to protect the Internet resolvers (clients) from forged DNS data created by DNS cache poisoning?

Options:

A.  

Stub resolver

B.  

BINDER

C.  

Split-horizon DNS

D.  

Domain Name System Extension (DNSSEC)

Discussion 0
Questions 14

Which of the following are the primary goals of the incident handling team?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Freeze the scene.

B.  

Repair any damage caused by an incident.

C.  

Prevent any further damage.

D.  

Inform higher authorities.

Discussion 0
Questions 15

The IT administrator wants to implement a stronger security policy. What are the four most important security priorities for PassGuide Software Systems Pvt. Ltd.?

Options:

A.  

Providing secure communications between the overseas office and the headquarters.

B.  

Implementing Certificate services on Texas office.

C.  

Protecting employee data on portable computers.

D.  

Providing two-factor authentication.

E.  

Ensuring secure authentication.

F.  

Preventing unauthorized network access.

G.  

Providing secure communications between Washington and the headquarters office.

Discussion 0
Questions 16

Which of the following tools can be used for stress testing of a Web server?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

Internet bots

B.  

Scripts

C.  

Anti-virus software

D.  

Spyware

Discussion 0
Questions 17

Which of the following tools are used as a network traffic monitoring tool in the Linux operating system?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Netbus

B.  

IPTraf

C.  

MRTG

D.  

Ntop

Discussion 0
Questions 18

Which of the following characters will you use to check whether an application is vulnerable to an SQL injection attack?

Options:

A.  

Dash (-)

B.  

Double quote (")

C.  

Single quote (')

D.  

Semi colon (;)

Discussion 0
Questions 19

Maria works as a professional Ethical Hacker. She has been assigned the project of testing the security of www.gentech.com. She is using dumpster diving to gather information about Gentech Inc.

In which of the following steps of malicious hacking does dumpster diving come under?

Options:

A.  

Multi-factor authentication

B.  

Role-based access control

C.  

Mutual authentication

D.  

Reconnaissance

Discussion 0
Questions 20

In which of the following attacking methods does an attacker distribute incorrect IP address?

Options:

A.  

IP spoofing

B.  

Mac flooding

C.  

DNS poisoning

D.  

Man-in-the-middle

Discussion 0
Questions 21

Which of the following statements are true about worms?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Worms cause harm to the network by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

B.  

Worms can exist inside files such as Word or Excel documents.

C.  

One feature of worms is keystroke logging.

D.  

Worms replicate themselves from one system to another without using a host file.

Discussion 0
Questions 22

Maria works as a professional Ethical Hacker. She is assigned a project to test the security of www.we-are-secure.com. She wants to test a DoS attack on the We-are-secure server. She finds that the firewall of the server is blocking the ICMP messages, but it is not checking the UDP packets. Therefore, she sends a large amount of UDP echo request traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the We-are-secure server. Which of the following DoS attacks is Maria using to accomplish her task?

Options:

A.  

Ping flood attack

B.  

Fraggle DoS attack

C.  

Teardrop attack

D.  

Smurf DoS attack

Discussion 0
Questions 23

Which of the following is used to gather information about a remote network protected by a firewall?

Options:

A.  

Warchalking

B.  

Wardialing

C.  

Firechalking

D.  

Firewalking

Discussion 0
Questions 24

Your company has been hired to provide consultancy, development, and integration services for a company named Brainbridge International. You have prepared a case study to plan the upgrade for the company. Based on the case study, which of the following steps will you suggest for configuring WebStore1?

Each correct answer represents a part of the solution. Choose two.

Options:

A.  

Customize IIS 6.0 to display a legal warning page on the generation of the 404.2 and 404.3 errors.

B.  

Move the WebStore1 server to the internal network.

C.  

Configure IIS 6.0 on WebStore1 to scan the URL for known buffer overflow attacks.

D.  

Move the computer account of WebStore1 to the Remote organizational unit (OU).

Discussion 0
Questions 25

You want to scan your network quickly to detect live hosts by using ICMP ECHO Requests. What type of scanning will you perform to accomplish the task?

Options:

A.  

Idle scan

B.  

TCP SYN scan

C.  

XMAS scan

D.  

Ping sweep scan

Discussion 0
Questions 26

Which of the following types of attacks is only intended to make a computer resource unavailable to its users?

Options:

A.  

Denial of Service attack

B.  

Replay attack

C.  

Teardrop attack

D.  

Land attack

Discussion 0
Questions 27

An attacker sends a large number of packets to a target computer that causes denial of service.

Which of the following type of attacks is this?

Options:

A.  

Spoofing

B.  

Snooping

C.  

Phishing

D.  

Flooding

Discussion 0
Questions 28

Which of the following are the rules by which an organization operates?

Options:

A.  

Acts

B.  

Policies

C.  

Rules

D.  

Manuals

Discussion 0
Questions 29

John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Hybrid attack

B.  

Rule based attack

C.  

Dictionary attack

D.  

Brute Force attack

Discussion 0
Questions 30

Adam works as a Penetration Tester for Umbrella Inc. A project has been assigned to him check the security of wireless network of the company. He re-injects a captured wireless packet back onto the network. He does this hundreds of times within a second. The packet is correctly encrypted and Adam assumes it is an ARP request packet. The wireless host responds with a stream of responses, all individually encrypted with different IVs.

Which of the following types of attack is Adam performing?

Options:

A.  

Replay attack

B.  

MAC Spoofing attack

C.  

Caffe Latte attack

D.  

Network injection attack

Discussion 0
Questions 31

Which of the following is an Internet mapping technique that relies on various BGP collectors that collect information such as routing updates and tables and provide this information publicly?

Options:

A.  

AS Route Inference

B.  

Path MTU discovery (PMTUD)

C.  

AS PATH Inference

D.  

Firewalking

Discussion 0
Questions 32

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

Options:

A.  

Email spoofing

B.  

Steganography

C.  

Web ripping

D.  

Social engineering

Discussion 0
Questions 33

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are working as a root user on the Linux operating system. Your company is facing an IP spoofing attack.

Which of the following tools will you use to get an alert saying that an upcoming IP packet is being spoofed?

Options:

A.  

Despoof

B.  

Dsniff

C.  

ethereal

D.  

Neotrace

Discussion 0
Questions 34

Which of the following provides packet-level encryption between hosts in a LAN?

Options:

A.  

PPTP

B.  

IPsec

C.  

PFS

D.  

Tunneling protocol

Discussion 0
Questions 35

Which of the following are the limitations for the cross site request forgery (CSRF) attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

The attacker must determine the right values for all the form inputs.

B.  

The attacker must target a site that doesn't check the referrer header.

C.  

The target site should have limited lifetime authentication cookies.

D.  

The target site should authenticate in GET and POST parameters, not only cookies.

Discussion 0
Questions 36

You discover that all available network bandwidth is being used by some unknown service. You discover that UDP packets are being used to connect the echo service on one machine to the chargen service on another machine. What kind of attack is this?

Options:

A.  

Smurf

B.  

Denial of Service

C.  

Evil Twin

D.  

Virus

Discussion 0
Questions 37

You work as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. The company uses Check Point SmartDefense to provide security to the network of the company. You use SmartDefense on the HTTP servers of the company to fix the limitation for the maximum number of response headers allowed.

Which of the following attacks will be blocked by defining this limitation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Land attack

B.  

Code red worm

C.  

Backdoor attack

D.  

User-defined worm

Discussion 0
Questions 38

Which of the following steps of incident response is steady in nature?

Options:

A.  

Containment

B.  

Eradication

C.  

Preparation

D.  

Recovery

Discussion 0
Questions 39

Which of the following describes network traffic that originates from the inside of a network perimeter and progresses towards the outside?

Options:

A.  

Ingress network

B.  

Inwards network

C.  

Egress network

D.  

Outwards network

Discussion 0
Questions 40

Which of the following statements is true about the difference between worms and Trojan horses?

Options:

A.  

Trojan horses are a form of malicious codes while worms are not.

B.  

Trojan horses are harmful to computers while worms are not.

C.  

Worms can be distributed through emails while Trojan horses cannot.

D.  

Worms replicate themselves while Trojan horses do not.

Discussion 0
Questions 41

Which of the following penetration testing phases involves gathering data from whois, DNS, and network scanning, which helps in mapping a target network and provides valuable information regarding the operating system and applications running on the systems?

Options:

A.  

Post-attack phase

B.  

On-attack phase

C.  

Attack phase

D.  

Pre-attack phase

Discussion 0
Questions 42

Which of the following wireless network security solutions refers to an authentication process in which a user can connect wireless access points to a centralized server to ensure that all hosts are properly authenticated?

Options:

A.  

Remote Authentication Dial-In User Service (RADIUS)

B.  

IEEE 802.1x

C.  

Wired Equivalent Privacy (WEP)

D.  

Wi-Fi Protected Access 2 (WPA2)

Discussion 0
Questions 43

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following steps of the pre-attack phase:

l Information gathering

l Determining network range

l Identifying active machines

l Finding open ports and applications

l OS fingerprinting

l Fingerprinting services

Now John wants to perform network mapping of the We-are-secure network. Which of the following tools can he use to accomplish his task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Ettercap

B.  

Traceroute

C.  

Cheops

D.  

NeoTrace

Discussion 0
Questions 44

In which of the following malicious hacking steps does email tracking come under?

Options:

A.  

Reconnaissance

B.  

Gaining access

C.  

Maintaining Access

D.  

Scanning

Discussion 0
Questions 45

John visits an online shop that stores the IDs and prices of the items to buy in a cookie. After selecting the items that he wants to buy, the attacker changes the price of the item to 1.

Original cookie values:

ItemID1=2

ItemPrice1=900

ItemID2=1

ItemPrice2=200

Modified cookie values:

ItemID1=2

ItemPrice1=1

ItemID2=1

ItemPrice2=1

Now, he clicks the Buy button, and the prices are sent to the server that calculates the total price.

Which of the following hacking techniques is John performing?

Options:

A.  

Computer-based social engineering

B.  

Man-in-the-middle attack

C.  

Cross site scripting

D.  

Cookie poisoning

Discussion 0
Questions 46

You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?

Options:

A.  

Identification

B.  

Containment

C.  

Eradication

D.  

Preparation

Discussion 0
Questions 47

Which of the following reads and writes data across network connections by using the TCP/IP protocol?

Options:

A.  

Fpipe

B.  

NSLOOKUP

C.  

Netcat

D.  

2Mosaic

Discussion 0
Questions 48

Firekiller 2000 is an example of a __________.

Options:

A.  

Security software disabler Trojan

B.  

DoS attack Trojan

C.  

Data sending Trojan

D.  

Remote access Trojan

Discussion 0
Questions 49

Which of the following netcat parameters makes netcat a listener that automatically restarts itself when a connection is dropped?

Options:

A.  

-u

B.  

-l

C.  

-p

D.  

-L

Discussion 0