Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Mile2 ML0-320 Exam - Cheat-Test.com

Free ML0-320 Sample Questions:

Q: 1
Spyware is either hardware or software installed on a computer which gather information about the user for later retrieval by whoever controls the Spyware. It is installed without the users knowledge. What are the two ctegories of Spyware that exist? (Choose two)
A. Surveillance
B. Screen capture
C. Key loggers
D. Advertising
Answer: A,D

Q: 2
MS SQL server makes use of Stored Procedures.There is an extended stored procedure called sp_makewebtask that can be used with data being returned from executed queries. What would you use this stored procedure for?
A. It is used to start a new web server instance
B. It is used to create and HTML page
C. It is used to perform an entry within a database
D. It is used to schedule a job task
Answer: B

Q: 3
Which of the following statements explain why hardware-based keystroke loggers are so dangerous? (Choose three)
A. They are expensive.
B. They can be installed or removed in seconds.
C. They are totally transparent to both the operating system and the user applications
D. Neither system administrator nor users routinely inspect the back of their PCs for suspicious devices
Answer: B,C,D

Q: 4
Wayne, who has a twisted mind,has been watching security mailing lists very closely. Today he has seen a new vulnerability announcement that affects multiple mail servers. Jack wishes to scan the internet for servers that are running one of those vulnerable mail servers.His intent is to do this passively at first by doing DNS queries using the nslookup command.
What type of resource record is Wayne looking for within the DNS query results?
A. Only A resource record
B. Only PTR records
C. Only MX records
D. Only CNAME records
Answer: C

Q: 5
Which of the following is a MS Access database SQL injection script?
A. OR a=a
B. AND 1=1
C. OR 1=1-
D. SELECT *FROM*
Answer: A

Q: 6
Pieces of malware code are getting smarter all the time. It seems it always finds a way of reinstalling itself on a system after it has been removed.
If you wish to look for malicious registry entries that could be used to restart such malware on a Windows XP computer,which of the following entries would you be looking for? (Choose two)
A. HKLM\Software\Microsoft\Windows\CurrentVersion\ RunOnce
B. HKLM\Software\Microsoft\windows\CurrentVersion\ XP\Startup
C. HKLM\Software\Microsoft\Windows\CurrentVersion\Run
D. HKLM\Software\Microsoft\Windows\CurrentVersion\ XP\Run
Answer: A,C

Q: 7
What technologies could a company deploy to protect all data passing from an employees home computer to the corporate intranet? (Choose two)
A. L2TP/Ipsec
B. PPTP/MPPE
C. WEP
D. IKE
Answer: A,B

Q: 8
Bob has heard about weaknesses related to phone systems from one of his phreaker friends. His friend warns him about the potential danger of listening devices that are sometimes badly configured. Bob is interested in being proactive and he would like to perform a validation of his company phone number range to see if there are any listening devices that might be used by a malicious attacker to get access to the internal network. What category of tool would Bob use for this purpose?
A. Worm Software
B. War Driving Software
C. War Dialing Software
D. A dialup connection software
Answer: C

Q: 9
System administrators need to be aware of what tool that adds white-bytes of executable code to an existing malicious binary with the goal of evading anti-trojan software using MD5 and CRC checksums?
A. ProDetect
B. RegMon
C. ADMutate
D. Stealth Tools v.2.0
Answer: D

Q: 10
What software can alert an administrator to modified files (system or otherwise) by comparing new the hash to the hash on the original trusted file?
A. Process Viewer
B. Paketto Keiretsu
C. VOMIT
D. Tripwire
Answer: D

Q: 11
Which of the following ports are used by the Simple Network Management Protocol? (Choose two)
A. 161 UDP
B. 161 TCP
C. 161 TCP
D. 162 UDP
Answer: A,D

Q: 12
When referring to databases,what would you call the number of rows within a table?
A. Cardinality
B. Degree
C. Domain
D. Candidate
Answer: A

Q: 13
Why is it more difficult to sanitize information about a company that has publicly-traded stock?
A. The company wants to promote itself as much as possible
B. The company must regularly submit financial information to the Securities and Exchange Commission which is then made public
C. It is impossible to remove information from search engines databases
D. The company must hire a security consultant with the expertise to santize the information.
Answer: B

Q: 14
Which scripting language do most open source vulnerability scanners use?
A. ASNL (Automated Security Nessus Language)
B. NASL (Nessus Attack Scripting Language)
C. SANL (Security Attack Nessus Language)
D. NASA (Nessus Automated Security Attack)
Answer: B

Q: 15
Which of the following is NOT a tool that could be perform a zone transfer?
A. DIG
B. Host
C. Nslookup
D. WHOIS
Answer: D

Q: 16
Yannick who is a very smart security tester has mentioned to one of his friends that he has found a way of appending data to an existing file using the built in Windows tools and no third party utility.
This text appended does not affect the functionality, size , or display within traditional file browsing utilities such as dir or Internet Explorer. What is Yannick making reference to in this case?
A. Steganography
B. Hybrid Encryption
C. Alternate Data Streams
D. Append.exe
Answer: C

Q: 17
Why are Trojans such as Beast a lot harder to detect?
A. They use a well known name to hide themselves
B. They inject themselves into another process
C. They have a polymorphic payload
D. They are self garbling and cannot be detected
Answer: B

Q: 18
Doing Operating System identification remotely is an art that requires analysis of responses from packets being sent. In order to do so efficiently, a methodology called fuzzy logic is often used. Which of the following would best describe what fuzzy logic is?
A. A problem solving control system
B. A special type of port scan
C. An operating system feature
D. A hardware device for OS identification
Answer: A

Q: 19
Which of the following is NOT a tool that could be used to perform a zone transfer?
A. DIG
B. Host
C. Nslookup
D. WHOIS
Answer: D

Q: 20
Why are Trojans such as Beast a lot harder to detect?
A. They use a well known name to hide themselves
B. They inject themselves into another process
C. They have a polymorphic payload
D. They are self garbling and cannot be detected
Answer: B


© 2014 Cheat-Test.com, All Rights Reserved