Pass4itsure > Mile2 > Mile2-Certifications > MK0-201 > MK0-201 Online Practice Questions and Answers

MK0-201 Online Practice Questions and Answers

Questions 4

Why is it so challenging to block packets from Remote Access Troans that use port 80 for network communications?Choose three.

A. To a firewall,the traffic appears simply to be from an internal user making an innoccous HTTP GET request.

B. Port 80 outbound is normally open on corporate firewalls

C. Stateful inspection firewalls will block unsolicited inbound HTTP GET requests

D. Not all firewalls are capable of inspecing data in the HTTP data fields for evidence of tunneling

Buy Now
Questions 5

Software Restriction Policies,if implemented correctly,can help protect against what kinds of threats? Choose two.

A. Trojans

B. Malware

C. Spam

D. Smurf Attacks

Buy Now
Questions 6

Which programs might an attacker use to facililate sniffing in a switched network?Choose all that apply.

A. Ettercap

B. Cain and Abel

C. MACof

D. Etherflood

Buy Now
Questions 7

A malicious hacker has been trying to penetrate TestKing.com from an external network location.He has tried every trick in his bag but still did not succeed.

From the choice presented below,what type of logical attempt is he most likely to attempt next?

A. Elevation of privileges

B. Pilfering of data

C. Denial of service

D. Installation of a back door

Buy Now
Questions 8

Dozens of methodologies exist on the market today.Most of them follow the very high level steps.

Which of the following would represent the most common and logical approach to penetration testing from the first step being accomplished on the left to the last step being done on the right side of the statement below?

A. Scanning,Footprinting,Enumeration,Penetration

B. Footprinting,Enumeration,Scanning,Penetration

C. Footprinting,Scanning,Enumeration,Penetration

D. Penetration,Enumeration,Scanning,Footprinting

Buy Now
Questions 9

How would you call a malware that is set to trigger at a specific date,or sometime in the future?

A. Virus

B. Worm

C. Time Bomb

D. Clocking

Buy Now
Questions 10

Looking at the SOA records presented below,for how long will the secondary DNS servers attempt to contact the primary DNS server before a zone be considered dead.

A. One week

B. Two weeks

C. 5 days

D. 8 days

Buy Now
Questions 11

Which of the following statements explain why hardware-based keystroke loggers are so dangerous? Choose three.

A. They are expensive.

B. They can be installed or removed in seconds.

C. They are totally transparent to both the operating system and the user applications

D. Neither system administrator nor users routinely inspect the back of their PCs for suspicious devices

Buy Now
Questions 12

Doing Operating System identification remotely is an art that requires analysis of responses from packets being sent.In order to do so efficiently,a methodology called fuzzy logic is often used. Which of the following would best describe what fuzzy logic is?

A. A problem solving control system

B. A special type of port scan

C. An operating system feature

D. A hardware device for OS identification

Buy Now
Questions 13

Assuming SNMP Agent devices are IPSec-capable,why would implementing IPSec help protect SNMP Agents?Choose three.

A. SNMP is installed by default on Windows computers

B. SNMP v.2 sends the community name in cleartext

C. SNMP v.2 does not encrypt any data

D. IPSec would protect against an attacker spoofing the IP address of the SNMP Management station

Buy Now
Exam Code: MK0-201
Exam Name: CPTS - Certified Pen Testing Specialist
Last Update: Apr 22, 2024
Questions: 247
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99