Free ML0-320 Exam Braindumps (page: 16)

Page 15 of 62

What technology can be deployed at the network layer to protect against sniffing? Choose the best

  1. SSL
  2. Certificates
  3. IPSec
  4. DAI

Answer(s): C



When referring to the prevalence of online computer crimes, which of the following would NOT be a factor that contributes to the proliferation or computer crimes?

  1. Widespread availability of computers
  2. Widespread availability of hacking tools
  3. The media and press coverage of incidents glamorizing hackers
  4. The laws and penalties associated with online crimes

Answer(s): D



This technique consists of using social to trick someone into revealing information they should not usually release to unauthorized users.
What do we call this technique or type of attack?

  1. Shoulder Surfing
  2. Eavesdropping
  3. Social Engineering
  4. Social Coining

Answer(s): C



A null session allows users to connect remotely to other Windows computers on the network. According to the implementation of NULL sessions of Windows platforms, how long would the password be in order to establish a NULL Session?

  1. At least 8 Characters
  2. A passphrase is used not a password
  3. There is no password involved
  4. Windows makes use of Digital Signature in such case, not passwords

Answer(s): C






Post your Comments and Discuss Mile2 ML0-320 exam with other Community members:

ML0-320 Exam Discussions & Posts