Free ML0-320 Exam Braindumps (page: 8)

Page 7 of 62

Which of the following countermeasures could be taken to implement security through obscurity and thus limit reconnaissance if an attacker issues this command against a web server? Choose the best

  1. Change the default error messages
  2. Change the webservers banner
  3. Enable SYN flood protection on a capable firewall
  4. Change the default homepage

Answer(s): B



Which of the following SQL scripts will discover the usernames and hashed passwords from a MSSQL server?

  1. SELECT *FROM*
  2. SELECT name,password FROM master..login UNION ALL SELECT *FROM database.log
  3. SELECT name,password FROM master..sysxlogins
  4. SELECT uname AND passwd FROM master

Answer(s): C



What technology has made trojans easy to distribute? Choose the best answer.

  1. Digitally Signed Software
  2. Assembly language
  3. EXE wrappers
  4. Personal firewall software

Answer(s): C



What is traceroute used for?

  1. To find gateways that are vulnerable to ICMP based attacks
  2. To find the best path to a destination address
  3. To find the path a packet traveled to get to the destination address
  4. To find the initial TTL (Time to live) value used within a packet

Answer(s): C






Post your Comments and Discuss Mile2 ML0-320 exam with other Community members:

ML0-320 Exam Discussions & Posts