Certbus > Mile2 > Mile2-Certifications > MK0-201 > MK0-201 Online Practice Questions and Answers

MK0-201 Online Practice Questions and Answers

Questions 4

Which of the following items is the least likely to be found while doing Scanning?Choose the best answer.

A. IP addresses

B. Operating System

C. System Owner

D. Services

Browse 247 Q&As
Questions 5

TestKing.com has been getting numerous complaints that one of their employees has been actively probing remote DNS servers and attempting to extact information from them.

After investigation it was detected that jack had used the nslookup command entensively and he also issued commands within nslookup such as server [remoteip]where[remoteip]is the IP address of the target he was probing.

Further investigation also revealed that he used the command is d targetdomain.com where targetdomain.com was the ddomain name he was attempting to get more info about,what was jack really attempting to achieve in this case?

A. See the UNIX permission of files

B. Perform a zone transfer

C. Perform a lookup on user and group permissions of files

D. Perform a zone incremental query

Browse 247 Q&As
Questions 6

Types of potential vulnerabilities that are commonly scanned for include:(Choose All that Apply)

A. Password vulnerabilities

B. Weak operating system and application default settings

C. Common configuration and coding mistakes

D. Protocol vulnerabilities (such as the TCP/IP stack vulnerabilities)

E. Physical observation of the target building

Browse 247 Q&As
Questions 7

What program can locate computers running sniffers by sending out special ARP packets that only network cards in promiscuous mode will reply to?Choose the best answer.

A. ARPwatch

B. Cain and Abel

C. Macof

D. Microsoft Network Monitor

Browse 247 Q&As
Questions 8

Mary has learned about the different ways authentication can be implemented on a web site. Which of the following forms of authentication would consist of the most basic form and also the less secure?

A. Digest Authentication

B. Basic Authentication

C. LDAP Authentication

D. Token Base Authentication

Browse 247 Q&As
Questions 9

The process of flooding a local segment with thousands of random MAC addresses can result in some switches behaving like a hub.The goal of the hacker is to accomplish what?Choose the best answer.

A. Denial of service

B. ARP cache poisoning

C. Sniffing in a switched network

D. SYN flood

Browse 247 Q&As
Questions 10

A null session allows users to connect remotely to other Windows computers on the network.According to the implementation of NULL Session on Windows platforms,how long would the password be in order to establish a NULL Session?

A. At least 8 Characters

B. A passphrase is used not a password

C. There is no password involved

D. Windows makes use of Digital Signature in such case,not passwords

Browse 247 Q&As
Questions 11

Which registry key setting will disable the automatic playing of executables on a CD-room when the CD-room is inserted into the computer?Choose the best answer.

A. HKEY_Current_User\System\CurrentControlSet\Control\cdrom\autoplay=0

B. HKEY_Current_Machine\System\CurrentControlSet\Service\cdrom\autorun=0

C. HKEY_Current_Machine\System\CurrentControlSet\Service\cdrom\auto=1

D. HKEY_Current_Machine\System\Services\Windows\cdrom\autoplay=0

Browse 247 Q&As
Exam Code: MK0-201
Exam Name: CPTS - Certified Pen Testing Specialist
Last Update: May 03, 2024
Questions: 247 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99