Free ML0-320 Exam Braindumps (page: 2)

Page 1 of 62

You have just attempted to perform DNS poisoning on the local network DNS server and did not succeed; you decide to launch an attack against routing tables instead.
Which of the following would NOT be an effective way of attempting to manipulate the routing table on the local network or through its gateway?

  1. By using a source route attack
  2. By using ICMP redirect messages
  3. By advertising bogus OSDF routes
  4. By advertising bogus RIP routes

Answer(s): C



Why is it so challenging to block packets from Remote Access Troans that use port 80 for network communications? Choose three.

  1. To a firewall, the traffic appears simply to be from an internal user making an innocuous HTTP GET request.
  2. Port 80 outbound is normally open on corporate firewalls
  3. Stateful inspection firewalls will block unsolicited inbound HTTP GET requests
  4. Not all firewalls are capable of inspecting data in the HTTP data fields for evidence of tunneling

Answer(s): A,B,D



Which of the following statements would best describe the act of signing a message with a Digital Signature?

  1. The sender creates a hash value of the message he wishes to send He uses his private key to encrypt the hash value.
    The message and the encrypted hash value are sent to the receiver.
  2. The sender creates a hash value of the message he wishes to send. He uses his public key to encrypt the hash value.
    The message and the encrypted has value are sent to the receiver.
  3. The sender creates a hash value of the message he wishes to send. The message and the hash value are sent to the receiver.
  4. The sender uses his public key to create a digital signature. The digital signature is sent along with the text message.
    The receiver will use the sender private key to validate the signature.

Answer(s): A



One of the last steps taken by an attacker will be to configure permanent access to a compromised system.

However, the installation of a backdoor, installation of new processes, and changes to key files could be very quickly detected by an administrator.

What tool would assist the attacker in preventing the administrator from detecting changes to files, new processes that are running, or other signs that the system might have been compromised?

  1. A Trojan horse
  2. A Rootkit
  3. A Backdoor
  4. A privilege escalation tool

Answer(s): B






Post your Comments and Discuss Mile2 ML0-320 exam with other Community members:

ML0-320 Exam Discussions & Posts