Free ML0-320 Exam Braindumps (page: 14)

Page 13 of 62

You are concerned about other people sniffing your data while it is travelling over your local network and the internet.
Which of the following would be the most effective countermeasure to protect your data against sniffing while it is in transit? Choose the best

  1. Encryption
  2. AntiSniff
  3. PromiScan
  4. Usage of a switch

Answer(s): A



Which Vulnerability Assessment tools perform dangerous/destructive scans. Choose two.

  1. MS Baseline Analyzer
  2. Nessus
  3. Snort
  4. X-Scan

Answer(s): B,D



Which of the following would represent a technique to embed data within another file whereby it would be near impossible for anyone using or looking at the file to claim that there might be a message hidden within the media or the existence of some from of message?

  1. Cryptography
  2. Encryption
  3. Steganography
  4. MimiCry

Answer(s): C



You have collected a series of messages that are all encrypted.
You do not have access to the matching plaintext nor do you have any idea of the key and algorithm that were used to encrypt those messages. You will attempt a crypto attack in order to find the key.
How would you call such an attack?

  1. chosen Plaintext Attack
  2. Known ciphertext attack
  3. Chosen Key Attack
  4. Cliphertext only attack

Answer(s): D






Post your Comments and Discuss Mile2 ML0-320 exam with other Community members:

ML0-320 Exam Discussions & Posts