Exam Code : ML0-320
Exam Name : Certified Penetration Testing Professional (CPTE) - 2024
Vendor Name :
"Mile2"
ML0-320 Dumps ML0-320 Braindumps
ML0-320 Real Questions ML0-320 Practice Test ML0-320 Actual Questions
Certified Penetration Testing Professional (CPTE)
- 2023
https://killexams.com/pass4sure/exam-detail/ML0-320
Why is it important to ensure that SRV records are not publicly accessible?Choose the best
Answer:.
SRV records indicate how long a machine has been up since reboot and hence could indicate patch levels
SRV records reveal Active Directory domain controllers
SRV records reveal software Update Services computers
SRV records are required on NT 4 domains
Cisco Catalyst Switches have which feature intended to prevent ARP cache poisoning?Choose the best
Answer:.
ARP watch
Dynamic ARP Inspection
VLANs
IPSec-ready
Which of the following capabilities do rootkits have?Choose all that apply.
Hide any file
Hide any process
Hide any listening port
Cause a blue screen of death on Windows computers
One key skill a penetration Tester must possess is documentation. There are different documents that will be produced in the course of doing a penetration test,out of the documents listed below which one would be the most important document that a Penetration Tester must have in order to be performing a test?
Network Diagram
Host and services list
Written Authorization
Security Policies
Which of these methods would help protect DNS records from unauthorized users?(Choose two.)
Removing the default setting on NT 4 and Windows 2000 DNS servers that allows zone transfers to any IP address
Using Active Directory Integrated zones on publicly-available DNS servers
Blocking incoming UDP port 53 requests to a DMZ hosting a DNS server
Using two DNS servers;An internal DNS server with internal resource records and an external DNS server with DMZ-based resource records
Which registry key setting will disable the automatic playing of executables on a CD-room when the CD-room is inserted into the computer?Choose the best
Answer:.
HKEY_Current_User\System\CurrentControlSet\Control\cdrom\autoplay=0
HKEY_Current_Machine\System\CurrentControlSet\Service\cdrom\autorun=0
HKEY_Current_Machine\System\CurrentControlSet\Service\cdrom\auto=1
HKEY_Current_Machine\System\Services\Windows\cdrom\autoplay=0
A normal connection is usally established using a TCP Three Way handshake where sequences of packets are sent as follows;Syn,Syn-Ack,Ack.A malicious attacker probing a remote target is sending a Syn packet to a target;however,when he gets a Syn-Ack response from the target,he always sends a Reset packet (RST)instead of completing the three way handshake with an Ack packet as per the protocol. What is the attackers goal when doing this?Choose the best
Answer:.
Attacker does not like to follow protocols and agreements
Attacker has his own modified protocol stacks
Attacker attempts to avoid being logged on remote hosts
Attacker attempts to avoid sending too much traffic
Which of the following would best describe a scanning technique that is the most reliable but also the most noticeable on the target is being evaluated?
Half-Scan
TCP Connect( )
Fin Scan
NMAP scan
If the DS Client software has been installed on Windows 95,Windows 98, and NT 4 computers,what setting of the LanMan Authentication level should be applied to counteract LanMAn hash sniffing and offline cracking?Choose the best
Answer:.
Send NTLM v2/Refuse LM & NTLM
Send NTLM only
Send LM & NTLM responses
Send NTLM v2/Refuse LM