Mile2 ML0-320 Exam Questions
certified penetration testing professional (Page 8 )

Updated On: 17-Feb-2026

Which of the following is a MS Access database SQL injection script?

  1. OR a=a
  2. AND 1=1
  3. OR 1=1-
  4. SELECT *FROM*

Answer(s): A



Which of the following statements explain why hardware-based keystroke loggers are so dangerous? Choose three.

  1. They are expensive.
  2. They can be installed or removed in seconds.
  3. They are totally transparent to both the operating system and the user applications
  4. Neither system administrator nor users routinely inspect the back of their PCs for suspicious devices

Answer(s): B,C,D



Which of the following enumeration techniques can reveal the true built-in Administrator account even if has been renamed? Choose two.

  1. Banner grabbing
  2. NetBIOS null session
  3. DNS zone transfers
  4. SNMP with default community name

Answer(s): B,D



Which of the following might be used to give false positives when a UDP scan is being performed against a DMZ server running DNS? Choose the best

  1. On the firewall, block ICMP TTL Exceeded
  2. On the firewall, block all incoming UDP
  3. On the firewall, block all TCP SYN packets
  4. On the firewall, block all ICMP Port Unreachable messages

Answer(s): D



Looking at the graphic presented below, what destination port is highlighted in the Hex dump presented? Extract the information from the Hex dump packet captured below.

  1. 53
  2. 69
  3. 50
  4. 80

Answer(s): D






Post your Comments and Discuss Mile2 ML0-320 exam dumps with other Community members:

Join the ML0-320 Discussion