Mile2 ML0-320 Exam Questions
certified penetration testing professional (Page 6 )

Updated On: 16-Feb-2026

Which of the following would best describe the meaning of steganography?

  1. The art and science of hiding information by embedding messages within other, seemingly harmless messages
  2. The art and science of hiding information by encrypting it with a symmetric cipher where the key will be used only once
  3. The art and science of hiding information by encrypting it using a public key encryption system where the key pair will be used only once
  4. The art and science of hiding information by embedding redundant data within the primary data and then using XOR against the stream

Answer(s): A



In symmetric cryptosystem, how many keys are needed to communicate securely between 10 different people who all wish to have a key pair to talk to each other?

  1. 2
  2. 1
  3. 45
  4. 90

Answer(s): C



What technology has made trojans easy to distribute? Choose the best.

  1. Digitally Signed Software
  2. Assembly language
  3. EXE wrappers
  4. Personal firewall software

Answer(s): C



It is common knowledge that a Penetration Test relies on a testers ability to collect information from different sources.
Only about 35% to 40% of the information collected will be from technical sources. Which of the following would NOT be one of the common ways for a security tester to collect information?

  1. Physical Access
  2. Authorized Access
  3. Social Access
  4. Digital Access

Answer(s): B



One of your clients has been the victim of a brute force attack against their SSH server. They ask you what could be done to protect their Linux servers. You propose the use of IP Tables (the built in kernel firewall) to limit connection attempts to protect their servers. You agree with your client to limit connections to the SSH port to a maximum of only three trials per minutes considering there is only one administrator who has a valid need to connect remotely onto this port.
If the threshold of three connectors is exceeded, the attacker will have to wait for another 60 seconds before it will resume allowing connections again.
Which of the following IP Tables entry would meet your clients needs?

  1. iptables-A INPUT -p tcp -dport 23 -m state -state NEW -m recent -update -second 60
    -hitcount4 -rttl -name SSH -j DROP
  2. iptables-A INPUT -p tcp -dport 22 -m state -state NEW -m recent -update -second 60
    -hit count3 -rttl -name SSH -j DROP
  3. iptables-A INPUT -p tcp -dport 22 -m state -state NEW -m recent -update -second 60
    -hitcount4 -rttl -name SSH -j DROP
  4. iptables-A OUTPUT -p tcp -dport 23 -m state -state NEW -m recent -update -second 60 -hitcount4 -rttl -name SdSH -j DROP

Answer(s): C






Post your Comments and Discuss Mile2 ML0-320 exam dumps with other Community members:

Join the ML0-320 Discussion