Free ML0-320 Exam Braindumps (page: 6)

Page 5 of 62

What built-in Windows command can be used to help find remote access trojans? Choose the best

  1. Netstat a
  2. Ipconfig/displaydns
  3. Nbtstat c
  4. Netdiag

Answer(s): A



Under the Windows platform, there is something referred to as Null Session.
Which of the following statements would best describe what a null session consists of?

  1. It is a session where zero bytes of traffic have been transferred
  2. It is a session where erroneous commands are being used showing the a lack of knowledge of the user connected.
  3. It is a remote session that is established anonymously to a window machine
  4. It is a anonymous FTP session under the Windows platform

Answer(s): C



Why is tunneling-based trojan software so useful for hackers if it is installed inside a corporate network? Choose the best

  1. Tunneling software uses ports that are not well knwon,eg.12345
  2. Stateful inspection firewalls can only filter Server ports of 1-1023
  3. It makes network penetration trivial the tunneling occurs using Whatever port(s) the firewall is configured to allow
  4. Anti-trojan software do not have signatures for tunneling trojans, therefore it is easy to have end-users install tunneling trojans.

Answer(s): C



On a Linux system, which of the following files would contain the list of user accounts, their shell, and their home directories?

  1. useradd
  2. shadow
  3. passwd
  4. group

Answer(s): C






Post your Comments and Discuss Mile2 ML0-320 exam with other Community members:

ML0-320 Exam Discussions & Posts