Mile2 ML0-320 Exam (page: 1)
Mile2 certified penetration testing professional
Updated on: 11-Aug-2025

Viewing Page 1 of 51

You have just attempted to perform DNS poisoning on the local network DNS server and did not succeed; you decide to launch an attack against routing tables instead.
Which of the following would NOT be an effective way of attempting to manipulate the routing table on the local network or through its gateway?

  1. By using a source route attack
  2. By using ICMP redirect messages
  3. By advertising bogus OSDF routes
  4. By advertising bogus RIP routes

Answer(s): C



Why is it so challenging to block packets from Remote Access Troans that use port 80 for network communications? Choose three.

  1. To a firewall, the traffic appears simply to be from an internal user making an innocuous HTTP GET request.
  2. Port 80 outbound is normally open on corporate firewalls
  3. Stateful inspection firewalls will block unsolicited inbound HTTP GET requests
  4. Not all firewalls are capable of inspecting data in the HTTP data fields for evidence of tunneling

Answer(s): A,B,D



Which of the following statements would best describe the act of signing a message with a Digital Signature?

  1. The sender creates a hash value of the message he wishes to send He uses his private key to encrypt the hash value.
    The message and the encrypted hash value are sent to the receiver.
  2. The sender creates a hash value of the message he wishes to send. He uses his public key to encrypt the hash value.
    The message and the encrypted has value are sent to the receiver.
  3. The sender creates a hash value of the message he wishes to send. The message and the hash value are sent to the receiver.
  4. The sender uses his public key to create a digital signature. The digital signature is sent along with the text message.
    The receiver will use the sender private key to validate the signature.

Answer(s): A



One of the last steps taken by an attacker will be to configure permanent access to a compromised system.

However, the installation of a backdoor, installation of new processes, and changes to key files could be very quickly detected by an administrator.

What tool would assist the attacker in preventing the administrator from detecting changes to files, new processes that are running, or other signs that the system might have been compromised?

  1. A Trojan horse
  2. A Rootkit
  3. A Backdoor
  4. A privilege escalation tool

Answer(s): B



Which of the following tools can detect hidden Alternative Data Streams on an NTFS file or folder? Choose all that apply.

  1. Lns.exe
  2. Lads.exe
  3. FileAlyzer
  4. ADSCheker

Answer(s): A,B,C



Viewing Page 1 of 51



Share your comments for Mile2 ML0-320 exam with other users:

Gurgaon 9/28/2023 4:35:00 AM

great questions
UNITED STATES


wasif 10/11/2023 2:22:00 AM

its realy good
UNITED ARAB EMIRATES


Shubhra Rathi 8/26/2023 1:12:00 PM

oracle 1z0-1059-22 dumps
Anonymous


Leo 7/29/2023 8:48:00 AM

please share me the pdf..
INDIA


AbedRabbou Alaqabna 12/18/2023 3:10:00 AM

q50: which two functions can be used by an end user when pivoting an interactive report? the correct answer is a, c because we do not have rank in the function pivoting you can check in the apex app
GREECE


Rohan Limaye 12/30/2023 8:52:00 AM

best to practice
Anonymous


Aparajeeta 10/13/2023 2:42:00 PM

so far it is good
Anonymous


Vgf 7/20/2023 3:59:00 PM

please provide me the dump
Anonymous


Deno 10/25/2023 1:14:00 AM

i failed the cisa exam today. but i have found all the questions that were on the exam to be on this site.
Anonymous


CiscoStudent 11/15/2023 5:29:00 AM

in question 272 the right answer states that an autonomous acces point is "configured and managed by the wlc" but this is not what i have learned in my ccna course. is this a mistake? i understand that lightweight aps are managed by wlc while autonomous work as standalones on the wlan.
Anonymous


pankaj 9/28/2023 4:36:00 AM

it was helpful
Anonymous


User123 10/8/2023 9:59:00 AM

good question
UNITED STATES


vinay 9/4/2023 10:23:00 AM

really nice
Anonymous


Usman 8/28/2023 10:07:00 AM

please i need dumps for isc2 cybersecuity
Anonymous


Q44 7/30/2023 11:50:00 AM

ans is coldline i think
UNITED STATES


Anuj 12/21/2023 1:30:00 PM

very helpful
Anonymous


Giri 9/13/2023 10:31:00 PM

can you please provide dumps so that it helps me more
UNITED STATES


Aaron 2/8/2023 12:10:00 AM

thank you for providing me with the updated question and answers. this version has all the questions from the exam. i just saw them in my exam this morning. i passed my exam today.
SOUTH AFRICA


Sarwar 12/21/2023 4:54:00 PM

how i can see exam questions?
CANADA


Chengchaone 9/11/2023 10:22:00 AM

can you please upload please?
Anonymous


Mouli 9/2/2023 7:02:00 AM

question 75: option c is correct answer
Anonymous


JugHead 9/27/2023 2:40:00 PM

please add this exam
Anonymous


sushant 6/28/2023 4:38:00 AM

please upoad
EUROPEAN UNION


John 8/7/2023 12:09:00 AM

has anyone recently attended safe 6.0 certification? is it the samq question from here.
Anonymous


Blessious Phiri 8/14/2023 3:49:00 PM

expository experience
Anonymous


concerned citizen 12/29/2023 11:31:00 AM

52 should be b&c. controller failure has nothing to do with this type of issue. degraded state tells us its a raid issue, and if the os is missing then the bootable device isnt found. the only other consideration could be data loss but thats somewhat broad whereas b&c show understanding of the specific issues the question is asking about.
UNITED STATES


deedee 12/23/2023 5:10:00 PM

great help!!!
UNITED STATES


Samir 8/1/2023 3:07:00 PM

very useful tools
UNITED STATES


Saeed 11/7/2023 3:14:00 AM

looks a good platform to prepare az-104
Anonymous


Matiullah 6/24/2023 7:37:00 AM

want to pass the exam
Anonymous


SN 9/5/2023 2:25:00 PM

good resource
UNITED STATES


Zoubeyr 9/8/2023 5:56:00 AM

question 11 : d
FRANCE


User 8/29/2023 3:24:00 AM

only the free dumps will be enough for pass, or have to purchase the premium one. please suggest.
Anonymous


CW 7/6/2023 7:37:00 PM

good questions. thanks.
Anonymous