Mile2 ML0-320 Exam Questions
certified penetration testing professional (Page 4 )

Updated On: 16-Feb-2026

Yannick who is a very smart security tester has mentioned to one of his friends that he has found a way of appending data to an existing file using the built in Windows tools and no third party utility.
This text appended does not affect the functionality, size, or display within traditional file browsing utilities such as dir or Internet Explorer.
What is Yannick making reference to in this case?

  1. Steganography
  2. Hybrid Encryption
  3. Alternate Data Streams
  4. Append.exe

Answer(s): C



Why are Trojans such as Beast a lot harder to detect? Choose the best answer.

  1. They use a well known name to hide themselves
  2. They inject themselves into another process
  3. They have a polymorphic payload
  4. They are self garbling and cannot be detected

Answer(s): B



Doing Operating System identification remotely is an art that requires analysis of responses from packets being sent. In order to do so efficiently, a methodology called fuzzy logic is often used. Which of the following would best describe what fuzzy logic is?

  1. A problem solving control system
  2. A special type of port scan
  3. An operating system feature
  4. A hardware device for OS identification

Answer(s): A



Which of the following is NOT a tool that could be used to perform a zone transfer?

  1. DIG
  2. Host
  3. Nslookup
  4. WHOIS

Answer(s): D



Why are Trojans such as Beast a lot harder to detect? Choose the best.

  1. They use a well known name to hide themselves
  2. They inject themselves into another process
  3. They have a polymorphic payload
  4. They are self garbling and cannot be detected

Answer(s): B






Post your Comments and Discuss Mile2 ML0-320 exam dumps with other Community members:

Join the ML0-320 Discussion