Free ML0-320 Exam Braindumps (page: 4)

Page 3 of 62

Using Netcat what would be the syntax to setup a listening back door from a compromised Windows Server that will spawn a shell when connecting to the remote server on port 777?

  1. nc |p 777 e cmd.exe
  2. nc sh p 777 e cmd.exe
  3. nc |p 777 sh cmd.exe
  4. nc |p 777 exec cmd.exe

Answer(s): A



Duane is a clever attacker, he has penetrated a system and wishes to hide some files within other files on the file system. Which of the following could be used by Duane to attempt hiding files within the file system?

  1. Attrib
  2. HideNSeek
  3. Chgrp
  4. Alternate Data Stream

Answer(s): D



Which of the following penetration framework is Open Source and offers features that are similar to some of its rival commercial tools?

  1. CANVAS
  2. CORE IMPACT
  3. METASPLOIT
  4. DEEP HOLE

Answer(s): C



Software Restriction Policies, if implemented correctly, can help protect against what kinds of threats? Choose two.

  1. Trojans
  2. Malware
  3. Spam
  4. Smurf Attacks

Answer(s): A,B






Post your Comments and Discuss Mile2 ML0-320 exam with other Community members:

ML0-320 Exam Discussions & Posts