Download Hacker Tools, Techniques, Exploits and Incident Handling.SEC504.ExamTopics.2025-09-24.26q.vcex

Vendor: SANS
Exam Code: SEC504
Exam Name: Hacker Tools, Techniques, Exploits and Incident Handling
Date: Sep 24, 2025
File Size: 20 KB
Downloads: 3

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

ProfExam Discount

Demo Questions

Question 1
Which of the following commands can be used for port scanning?
  1. nc -t
  2. nc -z
  3. nc -w
  4. nc -g
Correct answer: B
Question 2
You check performance logs and note that there has been a recent dramatic increase in the amount of broadcast traffic. What is this most likely to be an indicator of?
  1. Virus
  2. Syn flood
  3. Misconfigured router
  4. DoS attack
Correct answer: D
Question 3
John, a part-time hacker, has accessed in unauthorized way to the www.yourbank.com banking Website and stolen the bank account information of its users and their credit card numbers by using the SQL injection attack. Now, John wants to sell this information to malicious person Mark and make a deal to get a good amount of money. Since, he does not want to send the hacked information in the clear text format to Mark; he decides to send information in hidden text. For this, he takes a steganography tool and hides the information in ASCII text by appending whitespace to the end of lines and encrypts the hidden information by using the IDEA encryption algorithm. Which of the following tools is John using for steganography?
  1. Image Hide
  2. Mosaic
  3. Snow.exe
  4. Netcat
Correct answer: C
Explanation:
C: 1 - Mosted
C: 1 - Mosted
Question 4
Which of the following are the primary goals of the incident handling team?
Each correct answer represents a complete solution. Choose all that apply.
  1. Freeze the scene.
  2. Repair any damage caused by an incident.
  3. Prevent any further damage.
  4. Inform higher authorities.
Correct answer: ABC
Question 5
You have inserted a Trojan on your friend's computer and you want to put it in the startup so that whenever the computer reboots the Trojan will start to run on the startup. Which of the following registry entries will you edit to accomplish the task?
  1. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Startup
  2. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Auto
  3. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
  4. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Start
Correct answer: C
Question 6
Which of the following DoS attacks affects mostly Windows computers by sending corrupt UDP packets?
  1. Fraggle
  2. Ping flood
  3. Bonk
  4. Smurf
Correct answer: C
Explanation:
C: 1
C: 1
Question 7
Which of the following tools combines two programs, and also encrypts the resulting package in an attempt to foil antivirus programs?
  1. Trojan Man
  2. EliteWrap
  3. Tiny
  4. NetBus
Correct answer: A
Explanation:
B: 1 - Mosted
B: 1 - Mosted
Question 8
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He finds that the We-are- secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against __________.
  1. IIS buffer overflow
  2. NetBIOS NULL session
  3. SNMP enumeration
  4. DNS zone transfer
Correct answer: A
Explanation:
B: 1 - Mosted
B: 1 - Mosted
Question 9
Adam, a novice computer user, works primarily from home as a medical professional. He just bought a brand new Dual Core Pentium computer with over 3 GB of
RAM. After about two months of working on his new computer, he notices that it is not running nearly as fast as it used to. Adam uses antivirus software, anti- spyware software, and keeps the computer up-to-date with Microsoft patches. After another month of working on the computer, Adam finds that his computer is even more noticeably slow. He also notices a window or two pop-up on his screen, but they quickly disappear. He has seen these windows show up, even when he has not been on the Internet. Adam notices that his computer only has about 10 GB of free space available. Since his hard drive is a 200 GB hard drive, Adam thinks this is very odd. Which of the following is the mostly likely the cause of the problem?
  1. Computer is infected with the stealth kernel level rootkit.
  2. Computer is infected with stealth virus.
  3. Computer is infected with the Stealth Trojan Virus.
  4. Computer is infected with the Self-Replication Worm.
Correct answer: A
Question 10
Which of the following is spy software that records activity on Macintosh systems via snapshots, keystrokes, and Web site logging?
  1. Spector
  2. Magic Lantern
  3. eblaster
  4. NetBus
Correct answer: A
Explanation:
C: 1 - Mosted
C: 1 - Mosted
Question 11
Which of the following tools is used to attack the Digital Watermarking?
  1. Active Attacks
  2. 2Mosaic
  3. Steg-Only Attack
  4. Gifshuffle
Correct answer: B
Explanation:
C: 1 - Mosted
C: 1 - Mosted
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!