Latest ML0-320 Practice Tests with Actual Questions

Get Complete pool of questions with Premium PDF and Test Engine

Exam Code : ML0-320
Exam Name : Certified Penetration Testing Professional (CPTE) - 2024
Vendor Name : "Mile2"







ML0-320 Dumps ML0-320 Braindumps

ML0-320 Real Questions ML0-320 Practice Test ML0-320 Actual Questions


Mile2


ML0-320


Certified Penetration Testing Professional (CPTE)

- 2023


https://killexams.com/pass4sure/exam-detail/ML0-320



Question: 239

Why is it important to ensure that SRV records are not publicly accessible?Choose the best

Answer:.


  1. SRV records indicate how long a machine has been up since reboot and hence could indicate patch levels

  2. SRV records reveal Active Directory domain controllers

  3. SRV records reveal software Update Services computers

  4. SRV records are required on NT 4 domains




Answer: B



Question: 240

Cisco Catalyst Switches have which feature intended to prevent ARP cache poisoning?Choose the best

Answer:.


  1. ARP watch

  2. Dynamic ARP Inspection

  3. VLANs

  4. IPSec-ready




Answer: B



Question: 241

Which of the following capabilities do rootkits have?Choose all that apply.


  1. Hide any file

  2. Hide any process

  3. Hide any listening port

  4. Cause a blue screen of death on Windows computers



Question: 242

One key skill a penetration Tester must possess is documentation. There are different documents that will be produced in the course of doing a penetration test,out of the documents listed below which one would be the most important document that a Penetration Tester must have in order to be performing a test?


  1. Network Diagram

  2. Host and services list

  3. Written Authorization

  4. Security Policies




Answer: C



Question: 243

Which of these methods would help protect DNS records from unauthorized users?(Choose two.)


  1. Removing the default setting on NT 4 and Windows 2000 DNS servers that allows zone transfers to any IP address

  2. Using Active Directory Integrated zones on publicly-available DNS servers

  3. Blocking incoming UDP port 53 requests to a DMZ hosting a DNS server

  4. Using two DNS servers;An internal DNS server with internal resource records and an external DNS server with DMZ-based resource records




Answer: A, D



Question: 244

Which registry key setting will disable the automatic playing of executables on a CD-room when the CD-room is inserted into the computer?Choose the best

Answer:.


  1. HKEY_Current_User\System\CurrentControlSet\Control\cdrom\autoplay=0

  2. HKEY_Current_Machine\System\CurrentControlSet\Service\cdrom\autorun=0

  3. HKEY_Current_Machine\System\CurrentControlSet\Service\cdrom\auto=1

  4. HKEY_Current_Machine\System\Services\Windows\cdrom\autoplay=0



Question: 245

A normal connection is usally established using a TCP Three Way handshake where sequences of packets are sent as follows;Syn,Syn-Ack,Ack.A malicious attacker probing a remote target is sending a Syn packet to a target;however,when he gets a Syn-Ack response from the target,he always sends a Reset packet (RST)instead of completing the three way handshake with an Ack packet as per the protocol. What is the attackers goal when doing this?Choose the best

Answer:.


  1. Attacker does not like to follow protocols and agreements

  2. Attacker has his own modified protocol stacks

  3. Attacker attempts to avoid being logged on remote hosts

  4. Attacker attempts to avoid sending too much traffic




Answer: C



Question: 246

Which of the following would best describe a scanning technique that is the most reliable but also the most noticeable on the target is being evaluated?


  1. Half-Scan

  2. TCP Connect( )

  3. Fin Scan

  4. NMAP scan




Answer: B



Question: 247

If the DS Client software has been installed on Windows 95,Windows 98, and NT 4 computers,what setting of the LanMan Authentication level should be applied to counteract LanMAn hash sniffing and offline cracking?Choose the best

Answer:.


  1. Send NTLM v2/Refuse LM & NTLM

  2. Send NTLM only

  3. Send LM & NTLM responses

  4. Send NTLM v2/Refuse LM




Answer: A