Mile2 ML0-320 Exam Questions
certified penetration testing professional (Page 9 )

Updated On: 17-Feb-2026

There are different types of access control that can be used within a company. Logical security will be directly affected depending on the type that you select.
Which of the following access control types would be best to assign permissions according to the job an employee has within a company?

  1. Rule Based Access Control
  2. Discretionary Access Control
  3. Role Base Access Control
  4. Task Based Access Control

Answer(s): C



Which of the following statements would be TRUE when referring to Stream cliphers?

  1. Stream Ciphers encrypt one digit at a time
  2. Stream Ciphers divide the plaintext message into fixed group of bit and then encrypt these group of bits
  3. Stream Ciphers are NOT very commonly used
  4. Stream Ciphers can be implemented only in software

Answer(s): A



At times a tester will be challenged to craft a packet that needs a special quantity of payload data, a specific starting TTL value, a specific speed at which the packet can be sent, and specific number of outgoing packets, and/or very specific IP protocol. Which of the following tools would be best for use for that specific purpose?

  1. Hping
  2. Hydra
  3. Nmap
  4. Queso

Answer(s): A



Which of the following is the best security risk that has been experienced within applications over the past few years?

  1. Buffer Overflow
  2. Heap Overflow
  3. String Overflow
  4. Format Bug Overflow

Answer(s): A



Under the SNMP protocol, what does a trap consist of? Choose the best.

  1. It is an early implementation of an Honeypot
  2. It is a backdoor left the developer for quick access
  3. It is an alarm sent by the agent to the manager
  4. Older mechanism that is no longer used by SNMP

Answer(s): C






Post your Comments and Discuss Mile2 ML0-320 exam dumps with other Community members:

Join the ML0-320 Discussion