Mile2 ML0-320 Exam Questions
certified penetration testing professional (Page 5 )

Updated On: 16-Feb-2026

This document is a high level document that describes management intentions towards security.
What is the name of the document?

  1. Procedures
  2. Guidelines
  3. Policies
  4. Baselines

Answer(s): C



DNS Spoofing can allow an attacker to sniff traffic that is meant to go to particular web sites. Which of the following tools can perform DNS Spoofing? Choose two.

  1. Cain and Abel
  2. LC5
  3. WinDNSSpoof
  4. URLSnarf

Answer(s): A,C



On 802.11x Wireless Local Area Network, what is the effective length of the keys being used?

  1. 64 bit and 128 bits
  2. 128 bit
  3. 56 and 104 bits
  4. 104 and 128 bits

Answer(s): D



Spyware is either hardware or software installed on a computer which gather information about the user for later retrieval by whoever controls the Spyware.
It is installed without the users knowledge.
What are the two categories of Spyware that exist? (Choose two from the list below)

  1. Surveillance
  2. Screen capture
  3. key loggers
  4. Advertising

Answer(s): A,D



System administrators need to be aware of what tool that adds while-bytes of executable code to an existing malicious binary with the goal of evading anti-trojan software using MD5 and CRC checksums? Choose the best

  1. ProDetect
  2. RegMon
  3. ADMutate
  4. Stealth Tools v.2.0

Answer(s): D






Post your Comments and Discuss Mile2 ML0-320 exam dumps with other Community members:

Join the ML0-320 Discussion