Free ML0-320 Exam Braindumps (page: 18)

Page 17 of 62

What is one way an attacker can use to determine if a database front-end application is vulnerable to SQL injection?

  1. By entering a single star (*)in the username field.
  2. By entering all outgoing TCP connections after browsing the web application.
  3. There is no way to check, they just have to attempt on attack.
  4. By entering a single quota ( ) in the password field.

Answer(s): D



An attacker is sending packets with no flag set. This is also known as doing a NULL scan. Usually, operating system networking stacks will respond with a RST packed, however, some operating systems do not conform to this behavior and respond in appropriately. Such behavior could allow for the identification of the remote OS being used. Which of the following would be one of the Operating systems that responds differently?

  1. Solaris
  2. Linux
  3. Windows
  4. HP-UX

Answer(s): C



Which of the following protocols usually make use of the UDP protocol while querying information and the TCP protocol for some other functions?

  1. SMTP
  2. HTTP
  3. DNS
  4. TELNET

Answer(s): C



What are some of the weaknesses that make LAN Manager Hashes much easier to crack by an attacker? (Select all that apply.)

  1. The 14 character password is split in two
  2. The password is converted to Uppercase
  3. The hash value is encrypted using MD5
  4. The hash value is encrypted with AES

Answer(s): A,B






Post your Comments and Discuss Mile2 ML0-320 exam with other Community members:

ML0-320 Exam Discussions & Posts