Exam Details

  • Exam Code
    :MK0-201
  • Exam Name
    :Certified Penetration Testing Specialist (CPTS)
  • Certification
    :Mile2 Certifications
  • Vendor
    :Mile2
  • Total Questions
    :247 Q&As
  • Last Updated
    :May 09, 2025

Mile2 Mile2 Certifications MK0-201 Questions & Answers

  • Question 91:

    Pieces of malware code are getting smarter all the time.

    It seems it always finds a way of reinstalling itself on a system after it has been removed.

    If you wish to look for malicious registry entries that could be used to restart such malware on a Windows

    XP computer,which of the following entries would you be looking for? (Choose two from the list below)

    A. HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce

    B. HKLM\Software\Microsoft\windows\CurrentVersion\XP\Startup

    C. HKLM\Software\Microsoft\Windows\CurrentVersion\Run

    D. HKLM\Software\Microsoft\Windows\CurrentVersion\XP\Run

  • Question 92:

    What technologies could a company deploy to protect all data passing from an employees home computer to the corporate intranet?Choose two.

    A. L2TP/Ipsec

    B. PPTP/MPPE

    C. WEP

    D. IKE

  • Question 93:

    Wayne,who has a twisted mind,has been watching security mailing lists very closely.Today he has seen a new vulnerability announcement that affects multiple mail servers.Jack wishes to scan the internet for servers that are running one of those vulnerable mail servers.His intent is to do this passively at first by doing DNS queries using the nslookup command.

    What type of resource record is Wayne looking for within the DNS query results?

    A. Only A resource record

    B. Only PTR records

    C. Only MX records

    D. Only CNAME records

  • Question 94:

    Which of the following is a MS Access database SQL injection script?

    A. OR a=a

    B. AND 1=1

    C. OR 1=1

    D. SELECT *FROM*

  • Question 95:

    MS SQL server makes use of Stored Procedures.There is an extended stored procedure called sp_makewebtask that can be used with data being returned from executed queries.What would you use this stored procedure for?

    A. It is used to start a new web server instance

    B. It is used to create and HTML page

    C. It is used to perform an entry within a database

    D. It is used to schedule a job task

  • Question 96:

    Which of the following statements explain why hardware-based keystroke loggers are so dangerous? Choose three.

    A. They are expensive.

    B. They can be installed or removed in seconds.

    C. They are totally transparent to both the operating system and the user applications

    D. Neither system administrator nor users routinely inspect the back of their PCs for suspicious devices

  • Question 97:

    Why are SYN port scans not as stealthy as what they originally were several years ago?Choose two.

    A. Many firewall rulesets detect and block SYN scans

    B. IDS systems look for SYN flag packets due to the proliferation of SYN flood-based denial of service attacks

    C. RFC 3502 has redefined the TCP three-way handshake thus changing how SYN flags are used

    D. The Internet backtone routers all block SYN flag packets according to new RFC 3705

  • Question 98:

    Which of the following actions can often be used as countermeasures to port scans?Choose all that apply.

    A. Block unassigned port traffic

    B. Monitor transport-layer connections (control of TCP,SYN,RST,ACK)

    C. Block ICMP type 3 and 8

    D. Use active network monitoring

  • Question 99:

    Spyware is either hardware or software installed on a computer which gather information about the user

    for later retrieval by whoever controls the Spyware.

    It is installed without the users knowledge

    What are the two ctegories of Spyware that exist? (Choose two from the list below)

    A. Surveillance

    B. Screen capture

    C. Key loggers

    D. Advertising

  • Question 100:

    How would you call a malware that is set to trigger at a specific date,or sometime in the future?

    A. Virus

    B. Worm

    C. Time Bomb

    D. Clocking

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Mile2 exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your MK0-201 exam preparations and Mile2 certification application, do not hesitate to visit our Vcedump.com to find your solutions here.