Free ML0-320 Exam Braindumps (page: 12)

Page 11 of 62

Nmap is the leading port scanner for security testing and penetration testing.
As a tester it is a must have within your toolbox and you MUST be familiar with its basic syntax.
Which of the following command lines would represent a Ping Sweep being performed using Nmap.

  1. nmap sP 10.1.1.0/24
  2. nmap sT 10.1.1.0/24
  3. nmap sS 10.1.1.0/24
  4. nmap sU 10.1.1.0/24

Answer(s): A



How does a system administrator prevent Idp.exe and user2sid.exe tools from retrieving domain usernames, SIDs, and other information from a Windows 2000 Domain Controller if no username and password are supplied? Choose two.

  1. Add the Everyone group to the Pre-Windows 2000 Compatible Access group
  2. Remove the Everyone group from the Pre-Windows 2000 Compatible Access group
  3. set RestrictAnonymous registry key to two
  4. Set RestrictAnonymous registry key to zero

Answer(s): B,C



Session Hijacking is possible due to which weakness within the TCPIP stack implementation?

  1. Initial Sequence Number prediction
  2. Flags are not validated properly, it is possible to set all flags to 1 or 0.
  3. Validation of the size of a packet after reassembly is not implemented properly.
  4. Initial Sequence Number are too low

Answer(s): A



Why are SYN port scans not as stealthy as what they originally were several years ago? Choose two.

  1. Many firewall rulesets detect and block SYN scans
  2. IDS systems look for SYN flag packets due to the proliferation of SYN flood-based denial of service attacks
  3. RFC 3502 has redefined the TCP three-way handshake thus changing how SYN flags are used
  4. The Internet-backbone routers all block SYN flag packets according to new RFC 3705

Answer(s): A,B






Post your Comments and Discuss Mile2 ML0-320 exam with other Community members:

ML0-320 Exam Discussions & Posts