Looking at the SOA records presented below,for how long will the secondary DNS servers attempt to contact the primary DNS server before a zone be considered dead.
A. One week
B. Two weeks
C. 5 days
D. 8 days
Which of the following is NOT a tool that could be used to perform a zone transfer?
A. DIG
B. Host
C. Nslookup
D. WHOIS
When a piece of malware executes on a computer,what privilege level or account will it execute under? Choose the best answer.
A. System
B. Administrator
C. Same privilege as the user who isntalled it
D. Always runs as System or above
Mary has learned about the different ways authentication can be implemented on a web site. Which of the following forms of authentication would consist of the most basic form and also the less secure?
A. Digest Authentication
B. Basic Authentication
C. LDAP Authentication
D. Token Base Authentication
Which of the following exploits/abuse would all be located at the network layer of the OSI model? (Choose all that applies)
A. Route Spoofing
B. IP Source routing
C. IP Source Address Spoofing
D. ARP Spoofing
Intrusion Detection Systems have multiple ways to decode the information.
Which of the following definitions would best describe Protocol Anomaly Detection within an Intrusion Detection System (IDS) engine?
A. Interprets the attack as the victim would for greater accuracy
B. Identifies attacks that are based on condition,not patterns
C. Compares traffic to RFC standards and reports deviations
D. Identifies traffic that breaks policy or is not normal for network
What program can locate computers running sniffers by sending out special ARP packets that only network cards in promiscuous mode will reply to?Choose the best answer.
A. ARPwatch
B. Cain and Abel
C. Macof
D. Microsoft Network Monitor
When you create a hash value of the message you wish to send,then you encrypt the hash value using your private key before sending it to the receiver in order to prove the authenticity of the message.What would this be called within the cryptography world?
A. Hashing
B. Digital Signature
C. Encryption
D. Diffie-Hillman
To block tunneling remote access trojans like 007Shell,what should you do on your firewall?Choose the best answer.
A. Block all IGMP
B. Block UDP port 1900
C. Block all ICMP
D. Block TCP port 27374
Nathalie is exclusively making use of a public key crypto system to communicate with her peers.
She would like to send information to Bob while protecting the confidentiality of the content being sent over
the public network.
She will ask Bob to send one of his keys that she will use to encrypt the message content before sending
it.
Which key will Bob send to Nathalie?
A. His private key
B. His secret key
C. His public key
D. His symmetric key
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Mile2 exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your MK0-201 exam preparations and Mile2 certification application, do not hesitate to visit our Vcedump.com to find your solutions here.