Free ML0-320 Exam Braindumps (page: 15)

Page 14 of 62

Which programs might an attacker use to facilitate sniffing in a switched network? Choose all that apply.

  1. Ettercap
  2. Cain and Abel
  3. MACof
  4. Etherflood

Answer(s): A,B,C,D



Noah, a penetration tester, has been asked by abc.com to perform a security test against the company network from an internal location.
The owner of abc.com has provided Noah with a network diagram, documentations, and assistance.
Which of the following would best describe the type of test that Noah is about to perform?

  1. Black Box
  2. Zero Knowledge
  3. White Box
  4. Gray Box

Answer(s): C

Explanation:

Also known as glass box, structural, clear box and open box testing. A software testing technique whereby explicit knowledge of the internal workings of the item being tested are used to select the test data. Unlike black box testing, white box testing uses specific knowledge of programming code to examine outputs. The test is accurate only if the tester knows what the program is supposed to do. He or she can then see if the program diverges from its intended goal. White box testing does not account for errors caused by omission, and all visible code must also be
readable.
http//www.faqs.org/faqs/software-eng/testing-faq/section-13.html



The SNMP protocol makes use of community spring to control access. There are two community strings being used; each of these strings allow you to perform only specific functions within the system being managed by SNMP. Which of the following would represent the functions allowed by the two strings? Choose two)

  1. Public Gives public access to anyone to reconfigure the device
  2. Secret Gives read only access to the remote device being managed
  3. Public Gives read only access to the remote device being managed
  4. Private Gives read and write access to the remote device being managed

Answer(s): C,D



Why is it often recommended to rename the built-in Administrator account on a Windows 2000 domain? Choose the best

  1. Renaming the Guest account is of little value.
  2. If you don’t rename the Administrator account you will have NetBIOS name conflicts with the Administrator account from other domains in the forest.
  3. Account lockout will not stop password guessing attacks via SMB filesharing or BASIC web authentication against the built-in Administrator account.
  4. The default domain policy actually requires the Administrator account to be renamed.

Answer(s): C






Post your Comments and Discuss Mile2 ML0-320 exam with other Community members:

ML0-320 Exam Discussions & Posts