Mile2 ML0-320 Exam (page: 9)
Mile2 certified penetration testing professional
Updated on: 15-Feb-2026

Viewing Page 9 of 51

Nmap is the leading port scanner for security testing and penetration testing.
As a tester it is a must have within your toolbox and you MUST be familiar with its basic syntax.
Which of the following command lines would represent a Ping Sweep being performed using Nmap.

  1. nmap sP 10.1.1.0/24
  2. nmap sT 10.1.1.0/24
  3. nmap sS 10.1.1.0/24
  4. nmap sU 10.1.1.0/24

Answer(s): A



How does a system administrator prevent Idp.exe and user2sid.exe tools from retrieving domain usernames, SIDs, and other information from a Windows 2000 Domain Controller if no username and password are supplied? Choose two.

  1. Add the Everyone group to the Pre-Windows 2000 Compatible Access group
  2. Remove the Everyone group from the Pre-Windows 2000 Compatible Access group
  3. set RestrictAnonymous registry key to two
  4. Set RestrictAnonymous registry key to zero

Answer(s): B,C



Session Hijacking is possible due to which weakness within the TCPIP stack implementation?

  1. Initial Sequence Number prediction
  2. Flags are not validated properly, it is possible to set all flags to 1 or 0.
  3. Validation of the size of a packet after reassembly is not implemented properly.
  4. Initial Sequence Number are too low

Answer(s): A



Why are SYN port scans not as stealthy as what they originally were several years ago? Choose two.

  1. Many firewall rulesets detect and block SYN scans
  2. IDS systems look for SYN flag packets due to the proliferation of SYN flood-based denial of service attacks
  3. RFC 3502 has redefined the TCP three-way handshake thus changing how SYN flags are used
  4. The Internet-backbone routers all block SYN flag packets according to new RFC 3705

Answer(s): A,B



Which tools are capable of capturing Kerberos domain authentication credentials and then running either dictionary or brute force offline password cracking? Choose two.

  1. LC5
  2. Cain and Abel
  3. Ettercap
  4. Kerbsniff & kerbcrack

Answer(s): B,D



Viewing Page 9 of 51



Share your comments for Mile2 ML0-320 exam with other users:

JM 12/19/2023 2:23:00 PM

q252: dns poisoning is the correct answer, not locator redirection. beaconing is detected from a host. this indicates that the system has been infected with malware, which could be the source of local dns poisoning. location redirection works by either embedding the redirection in the original websites code or having a user click on a url that has an embedded redirect. since users at a different office are not getting redirected, it isnt an embedded redirection on the original website and since the user is manually typing in the url and not clicking a link, it isnt a modified link.
UNITED STATES


Freddie 12/12/2023 12:37:00 PM

helpful dump questions
SOUTH AFRICA


Da Costa 8/25/2023 7:30:00 AM

question 423 eigrp uses metric
Anonymous


Bsmaind 8/20/2023 9:22:00 AM

hello nice dumps
Anonymous


beau 1/12/2024 4:53:00 PM

good resource for learning
UNITED STATES


Sandeep 12/29/2023 4:07:00 AM

very useful
Anonymous


kevin 9/29/2023 8:04:00 AM

physical tempering techniques
Anonymous


Blessious Phiri 8/15/2023 4:08:00 PM

its giving best technical knowledge
Anonymous


Testbear 6/13/2023 11:15:00 AM

please upload
ITALY


shime 10/24/2023 4:23:00 AM

great question with explanation thanks!!
ETHIOPIA


Thembelani 5/30/2023 2:40:00 AM

does this exam have lab sections?
Anonymous


Shin 9/8/2023 5:31:00 AM

please upload
PHILIPPINES


priti kagwade 7/22/2023 5:17:00 AM

please upload the braindump for .net
UNITED STATES


Robe 9/27/2023 8:15:00 PM

i need this exam 1z0-1107-2. please.
Anonymous


Chiranthaka 9/20/2023 11:22:00 AM

very useful!
Anonymous


Not Miguel 11/26/2023 9:43:00 PM

for this question - "which three type of basic patient or member information is displayed on the patient info component? (choose three.)", list of conditions is not displayed (it is displayed in patient card, not patient info). so should be thumbnail of chatter photo
Anonymous


Andrus 12/17/2023 12:09:00 PM

q52 should be d. vm storage controller bandwidth represents the amount of data (in terms of bandwidth) that a vms storage controller is using to read and write data to the storage fabric.
Anonymous


Raj 5/25/2023 8:43:00 AM

nice questions
UNITED STATES


max 12/22/2023 3:45:00 PM

very useful
Anonymous


Muhammad Rawish Siddiqui 12/8/2023 6:12:00 PM

question # 208: failure logs is not an example of operational metadata.
SAUDI ARABIA


Sachin Bedi 1/5/2024 4:47:00 AM

good questions
Anonymous


Kenneth 12/8/2023 7:34:00 AM

thank you for the test materials!
KOREA REPUBLIC OF


Harjinder Singh 8/9/2023 4:16:00 AM

its very helpful
HONG KONG


SD 7/13/2023 12:56:00 AM

good questions
UNITED STATES


kanjoe 7/2/2023 11:40:00 AM

good questons
UNITED STATES


Mahmoud 7/6/2023 4:24:00 AM

i need the dumb of the hcip security v4.0 exam
EGYPT


Wei 8/3/2023 4:18:00 AM

upload the dump please
HONG KONG


Stephen 10/3/2023 6:24:00 PM

yes, iam looking this
AUSTRALIA


Stephen 8/4/2023 9:08:00 PM

please upload cima e2 managing performance dumps
Anonymous


hp 6/16/2023 12:44:00 AM

wonderful questions
Anonymous


Priyo 11/14/2023 2:23:00 AM

i used this site since 2000, still great to support my career
INDONESIA


Jude 8/29/2023 1:56:00 PM

why is the answer to "which of the following is required by scrum?" all of the following stated below since most of them are not mandatory? sprint retrospective. members must be stand up at the daily scrum. sprint burndown chart. release planning.
UNITED STATES


Marc blue 9/15/2023 4:11:00 AM

great job. hope this helps out.
UNITED STATES


Anne 9/13/2023 2:33:00 AM

upload please. many thanks!
Anonymous