Free ML0-320 Exam Braindumps (page: 13)

Page 12 of 62

Which tools are capable of capturing Kerberos domain authentication credentials and then running either dictionary or brute force offline password cracking? Choose two.

  1. LC5
  2. Cain and Abel
  3. Ettercap
  4. Kerbsniff & kerbcrack

Answer(s): B,D



Which of the following items is the least likely to be found while doing Scanning? Choose the best

  1. IP addresses
  2. Operating System
  3. System Owner
  4. Services

Answer(s): C



Nathalie, an employee of Corporation XYZ, has notice that Bob, one of her coworkers, has

been abusing company assets and resources for his own personal gain. According to good ethics values, what should Nathalie do in this case?

  1. Immediately install a network sniffer and keystroke recorder to monitor Bobs activities.
  2. Retaliate by abusing Bobs resources; he does it to the company, hence why not do it against Bob himself.
  3. Report Bob to upper management where a decision about a course of action can be made along with the HR and Legal department.
  4. Nathalie should not get involved; this is none of her business. she should simply continue her work day and wait unit he gets caught.

Answer(s): C



MS SQL server makes use of Stored Procedures. There is an extended stored procedure called sp_makewebtask that can be used with data being returned from executed queries.
What would you use this stored procedure for?

  1. It is used to start a new web server instance
  2. It is used to create and HTML page
  3. It is used to perform an entry within a database
  4. It is used to schedule a job task

Answer(s): B






Post your Comments and Discuss Mile2 ML0-320 exam with other Community members:

ML0-320 Exam Discussions & Posts