Download Hacker Tools, Techniques, Exploits and Incident Handling.SEC504.CertDumps.2025-11-25.27q.vcex

Vendor: SANS
Exam Code: SEC504
Exam Name: Hacker Tools, Techniques, Exploits and Incident Handling
Date: Nov 25, 2025
File Size: 20 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
Which of the following steps can be taken as countermeasures against sniffer attacks? Each correct answer represents a complete solution. Choose all that apply.
  1. Use encrypted protocols for all communications.
  2. Use switches instead of hubs since they switch communications, which means that information is delivered only to the predefined host.
  3. Use tools such as StackGuard and Immunix System to avoid attacks.
  4. Reduce the range of the network to avoid attacks into wireless networks.
Correct answer: ABD
Explanation:
AB: 1
AB: 1
Question 2
Which of the following is a process of searching unauthorized modems?
  1. Espionage
  2. War dialing
  3. System auditing
  4. Scavenging
Correct answer: B
Explanation:
C: 1 - Mosted
C: 1 - Mosted
Question 3
Which of the following attacks capture the secret value like a hash and reuse it later to gain access to a system without ever decrypting or decoding the hash?
  1. Cross Site Scripting attack
  2. Replay attack
  3. Rainbow attack
  4. Hashing attack
Correct answer: B
Question 4
Adam works as a Security administrator for Umbrella Inc. He runs the following traceroute and notices that hops 19 and 20 both show the same IP address.
172.16.1.254
(172.16.1.254) 0.724 ms 3.285 ms 0.613 ms 2 ip68-98-1761.nv.nv.cox.net
(68.98.176.1) 12.169 ms 14.958 ms 13.416 ms 3 ip68-98-176-1.nv.nv.cox.net
(68.98.176.1) 13.948 ms ip68-100-0-1.nv.nv. cox.net
(68.100.0.1) 16.743 ms 16.207 ms 4 ip68-100-0-137.nv.nv.cox.net
(68.100.0.137) 17.324 ms 13.933 ms 20.938 ms 5 68.1.1.4
(68.1.1.4) 12.439 ms 220.166 ms 204.170 ms 6 so-6-0-0.gar2.wdc1.Level3.net
(67.29.170.1) 16.177 ms 25.943 ms 14.104 ms 7 unknown.Level3.net
(209.247.9.173) 14.227 ms 17.553 ms 15.415 ms "Examkiller" - 8 so-0-1-0.bbr1.NewYork1.level3.net
(64.159.1.41) 17.063 ms 20.960 ms 19.512 ms 9 so-7-0-0.gar1. NewYork1.Level3.net
(64.159.1.182) 20.334 ms 19.440 ms 17.938 ms 10 so-4-0-0.edge1.NewYork1.Level3. net
(209.244.17.74) 27.526 ms 18.317 ms 21.202 ms 11 uunet-level3-oc48.NewYork1.Level3.net
(209.244.160.12) 21.411 ms 19.133 ms 18.830 ms 12 0.so-6-0-0.XL1.NYC4.ALTER.NET
(152.63.21.78) 21.203 ms 22.670 ms 20.111 ms 13 0.so-2-0-0.TL1.NYC8.ALTER.NET
(152.63.0.153) 30.929 ms 24.858 ms 23.108 ms 14 0.so-4-1-0.TL1.ATL5.ALTER.NET
(152.63.10.129) 37.894 ms 33.244 ms 33.910 ms 15 0.so-7-0-0.XL1.MIA4.ALTER.NET
(152.63.86.189) 51.165 ms 49.935 ms 49.466 ms 16 0.so-3-0-0.XR1.MIA4.ALTER. NET
(152.63.101.41) 50.937 ms 49.005 ms 51.055 ms 17 117.ATM6-0.GW5.MIA1.ALTER.NET
(152.63.82.73) 51.897 ms 50.280 ms 53.647 ms 18 Examkillergw1. customer.alter.net
(65.195.239.14) 51.921 ms 51.571 ms 56.855 ms 19www.examkiller.com
(65.195.239.22) 52.191 ms 52.571 ms 56.855 ms 20 www.examkiller.com
(65.195.239.22) 53.561 ms 54.121 ms 58.333 ms
Which of the following is the most like cause of this issue?
  1. An application firewall
  2. Intrusion Detection System
  3. Network Intrusion system
  4. A stateful inspection firewall
Correct answer: D
Question 5
Which of the following Incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an enterprise?
  1. Preparation phase
  2. Eradication phase
  3. Identification phase
  4. Recovery phase
  5. Containment phase
Correct answer: A
Explanation:
A: 1 - Mosted
A: 1 - Mosted
Question 6
Which of the following attacks come under the category of layer 2 Denial-of-Service attacks? Each correct answer represents a complete solution. Choose all that apply.
  1. Spoofing attack
  2. SYN flood attack
  3. Password cracking
  4. RF jamming attack
Correct answer: AB
Question 7
Which of the following tools is used to attack the Digital Watermarking?
  1. Active Attacks
  2. 2Mosaic
  3. Steg-Only Attack
  4. Gifshuffle
Correct answer: B
Explanation:
C: 1 - Mosted
C: 1 - Mosted
Question 8
Which of the following is spy software that records activity on Macintosh systems via snapshots, keystrokes, and Web site logging?
  1. Spector
  2. Magic Lantern
  3. eblaster
  4. NetBus
Correct answer: A
Explanation:
C: 1 - Mosted
C: 1 - Mosted
Question 9
Adam, a novice computer user, works primarily from home as a medical professional. He just bought a brand new Dual Core Pentium computer with over 3 GB of
RAM. After about two months of working on his new computer, he notices that it is not running nearly as fast as it used to. Adam uses antivirus software, anti- spyware software, and keeps the computer up-to-date with Microsoft patches. After another month of working on the computer, Adam finds that his computer is even more noticeably slow. He also notices a window or two pop-up on his screen, but they quickly disappear. He has seen these windows show up, even when he has not been on the Internet. Adam notices that his computer only has about 10 GB of free space available. Since his hard drive is a 200 GB hard drive, Adam thinks this is very odd. Which of the following is the mostly likely the cause of the problem?
  1. Computer is infected with the stealth kernel level rootkit.
  2. Computer is infected with stealth virus.
  3. Computer is infected with the Stealth Trojan Virus.
  4. Computer is infected with the Self-Replication Worm.
Correct answer: A
Question 10
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He finds that the We-are- secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against __________.
  1. IIS buffer overflow
  2. NetBIOS NULL session
  3. SNMP enumeration
  4. DNS zone transfer
Correct answer: A
Explanation:
B: 1 - Mosted
B: 1 - Mosted
Question 11
Which of the following tools combines two programs, and also encrypts the resulting package in an attempt to foil antivirus programs?
  1. Trojan Man
  2. EliteWrap
  3. Tiny
  4. NetBus
Correct answer: A
Explanation:
B: 1 - Mosted
B: 1 - Mosted
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!