Free ML0-320 Exam Braindumps (page: 11)

Page 10 of 62

What Windows technology should prevent SMB Relay from sniffing user credentials in a man in the middle attack? Choose the best

  1. Windows Update
  2. SMB Signing
  3. NetBIOS over TCP
  4. SYSKEY

Answer(s): B



Bob is using a new sniffer called Ethereal.
However, it seems that Bob can only see packets that are sent from and to his own network interface card (NIC). He cannot see any traffic from the other station.
What could be the cause of Bobs problem? (Select two)

  1. The NIC is not in promiscuous mode
  2. The network is using UDP traffic
  3. Bob is connected to a switched network
  4. The sniffer does not support Bobs TCP/IP network stack

Answer(s): A,B



Name Servers are the Penetration Testers best friend. The Domain Name Registration database contains information about who registered a particular domain.
What common command line as well as web based tool could be used to extract this information from the public database of Domain Name registration.

  1. Whois
  2. traceroute
  3. SOA Query tool
  4. Resolve

Answer(s): A



Keystroke loggers can be found in which of the following forms? Choose all that apply.

  1. Trojans
  2. Spyware
  3. Text files
  4. A dynamic link library file which replaces the standard GINA.dII

Answer(s): A,B,D






Post your Comments and Discuss Mile2 ML0-320 exam with other Community members:

ML0-320 Exam Discussions & Posts