Mile2 ML0-320 Exam Questions
certified penetration testing professional (Page 12 )

Updated On: 17-Feb-2026

What does the union operation perform when attempting to execute an SQL Injection through a web form?

  1. Union Operation permits combining two results
  2. Union Operation permits changing the DB password
  3. Union operation is used to combine two accounts
  4. Union operation is used to combine two tables

Answer(s): A



How does a system administrator prevent Idp.exe and user2sid.exe tools from retrieving domain usernames, SIDs, and other information from a Windows 2000 Domain Controller if no username and password are supplied? Choose two.

  1. Add the Everyone group to the Pre-Windows 2000 Compatible Access group
  2. Remove the Everyone group from the Pre-Windows 2000 Compatible Access group
  3. Set RestrictAnonymous registry key to two
  4. Set RestrictAnonymous registry key to zero

Answer(s): B,C



Under the Windows platform, there is something referred to as Null Session.
Which of the following statements would best describe what a null session consists of?

  1. It is a session where zero bytes of traffic have been transferred
  2. It is a session where erroneous commands are being used showing the lack of knowledge of the user connected.
  3. It is a remote session that is established anonymously to a Windows machine.
  4. It is a anonymous FTP session under the Windows platform

Answer(s): C



Nathalie is exclusively making use of a public key crypto system to communicate with her peers.
She would like to send information to Bob while protecting the confidentiality of the content being sent over the public network.
She will ask Bob to send one of his keys that she will use to encrypt the message content before sending it.
Which key will Bob send to Nathalie?

  1. His private key
  2. His secret key
  3. His public key
  4. His symmetric key

Answer(s): C



Why is it more difficult to sanitize information about a company that has publicly-traded stock? Choose the best

  1. The company wants to promote itself as much as possible
  2. The company must regularly submit financial information to the Securities and Exchange Commission which is then made public
  3. It is impossible to remove information from search engines databases
  4. The company must hire a security consultant with the expertise to sanitize the information.

Answer(s): B






Post your Comments and Discuss Mile2 ML0-320 exam dumps with other Community members:

Join the ML0-320 Discussion