Free ML0-320 Exam Braindumps (page: 3)

Page 2 of 62

Which of the following tools can detect hidden Alternative Data Streams on an NTFS file or folder? Choose all that apply.

  1. Lns.exe
  2. Lads.exe
  3. FileAlyzer
  4. ADSCheker

Answer(s): A,B,C



In order to identify a unique record within a database what would you use?

  1. A foreign key
  2. A primary key
  3. A view
  4. A unique key

Answer(s): B



Why is it important to the security of a network to create a complex password for the SA account on a MSSQL server installation?

  1. The SA account is a pseudo-account and does not have any privileges.
  2. The SA account can add/delete or change Domain User accounts.
  3. The SA account can have privileges of the local administrators group on the host OS.
  4. The SA account is the most powerful account on the domain controller.

Answer(s): C



Bryce, who is a great security professional with a perfect track record, has just been called into his supervisor's office.
His supervisor has the sad task of letting him know that has the next position being cut in their downsizing effort. Bryce has been known to be a mellow type of person but the version of being unemployed after working for 25 years at the same company is just a bit too much for him. He cannot understand why newer employees with only a few years of experience have not been fired before him and why he is the one that must leave. Bryce tells himself that is employer is going to pay dearly for this and has planning to use his skills to cause disruption within the company infrastructure.

Which of the following term would best describe the reaction of Bryce?

  1. Cracker
  2. Disgruntled Employee
  3. Ethical Hacker
  4. Revenge Master

Answer(s): B






Post your Comments and Discuss Mile2 ML0-320 exam with other Community members:

ML0-320 Exam Discussions & Posts