ML0-320 Dumps ML0-320 Braindumps

ML0-320 Real Questions ML0-320 Practice Test ML0-320 Actual Questions


Mile2


ML0-320


Certified Penetration Testing Professional (CPTE)

- 2023


https://killexams.com/pass4sure/exam-detail/ML0-320


QUESTION: 239

Why is it important to ensure that SRV records are not publicly accessible?Choose the best Answer:.


  1. SRV records indicate how long a machine has been up since reboot and hence could indicate patch levels

  2. SRV records reveal Active Directory domain controllers

  3. SRV records reveal software Update Services computers

  4. SRV records are required on NT 4 domains


Answer: B


QUESTION: 240

Cisco Catalyst Switches have which feature intended to prevent ARP cache poisoning?Choose the best Answer:.


  1. ARP watch

  2. Dynamic ARP Inspection

  3. VLANs

  4. IPSec-ready


Answer: B


QUESTION: 241

Which of the following capabilities do rootkits have?Choose all that apply.


  1. Hide any file

  2. Hide any process

  3. Hide any listening port

  4. Cause a blue screen of death on Windows computers


QUESTION: 242

One key skill a penetration Tester must possess is documentation. There are different documents that will be produced in the course of doing a penetration test,out of the documents listed below which one would be the most important document that a Penetration Tester must have in order to be performing a test?


  1. Network Diagram

  2. Host and services list

  3. Written Authorization

  4. Security Policies


Answer: C


QUESTION: 243

Which of these methods would help protect DNS records from unauthorized users?(Choose two.)


  1. Removing the default setting on NT 4 and Windows 2000 DNS servers that allows zone transfers to any IP address

  2. Using Active Directory Integrated zones on publicly-available DNS servers

  3. Blocking incoming UDP port 53 requests to a DMZ hosting a DNS server

  4. Using two DNS servers;An internal DNS server with internal resource records and an external DNS server with DMZ-based resource records


Answer: A, D


QUESTION: 244

Which registry key setting will disable the automatic playing of executables on a CD-room when the CD-room is inserted into the computer?Choose the best Answer:.


  1. HKEY_Current_User\System\CurrentControlSet\Control\cdrom\autoplay=0

  2. HKEY_Current_Machine\System\CurrentControlSet\Service\cdrom\autorun=0

  3. HKEY_Current_Machine\System\CurrentControlSet\Service\cdrom\auto=1

  4. HKEY_Current_Machine\System\Services\Windows\cdrom\autoplay=0


QUESTION: 245

A normal connection is usally established using a TCP Three Way handshake where sequences of packets are sent as follows;Syn,Syn-Ack,Ack.A malicious attacker probing a remote target is sending a Syn packet to a target;however,when he gets a Syn-Ack response from the target,he always sends a Reset packet (RST)instead of completing the three way handshake with an Ack packet as per the protocol. What is the attackers goal when doing this?Choose the best Answer:.


  1. Attacker does not like to follow protocols and agreements

  2. Attacker has his own modified protocol stacks

  3. Attacker attempts to avoid being logged on remote hosts

  4. Attacker attempts to avoid sending too much traffic


Answer: C


QUESTION: 246

Which of the following would best describe a scanning technique that is the most reliable but also the most noticeable on the target is being evaluated?


  1. Half-Scan

  2. TCP Connect( )

  3. Fin Scan

  4. NMAP scan


Answer: B


QUESTION: 247

If the DS Client software has been installed on Windows 95,Windows 98, and NT 4 computers,what setting of the LanMan Authentication level should be applied to counteract LanMAn hash sniffing and offline cracking?Choose the best Answer:.


  1. Send NTLM v2/Refuse LM & NTLM

  2. Send NTLM only

  3. Send LM & NTLM responses

  4. Send NTLM v2/Refuse LM


Answer: A