Exam Details

  • Exam Code
    :MK0-201
  • Exam Name
    :Certified Penetration Testing Specialist (CPTS)
  • Certification
    :Mile2 Certifications
  • Vendor
    :Mile2
  • Total Questions
    :247 Q&As
  • Last Updated
    :May 09, 2025

Mile2 Mile2 Certifications MK0-201 Questions & Answers

  • Question 141:

    Which of the following wouldbest match the following description.A program that looks useful at first sight but attempt to break your security policy by installling unwatned software or remote access software without your knowledge?

    A. Rootkit

    B. Worm

    C. Trojan

    D. Virus

  • Question 142:

    If IPSec cannot be implemented to secure network communication from sniffing,what program would be an alternative choice for secure terminal logins and file transfers on Windows computers?Choose the best answer.

    A. Hyperterm

    B. puTTY

    C. Sterm

    D. WinPCap

  • Question 143:

    Types of potential vulnerabilities that are commonly scanned for include:(Choose All that Apply)

    A. Password vulnerabilities

    B. Weak operating system and application default settings

    C. Common configuration and coding mistakes

    D. Protocol vulnerabilities (such as the TCP/IP stack vulnerabilities)

    E. Physical observation of the target building

  • Question 144:

    Having just downloaded a new version of Cain and Abel,you wish to monitor your network for clear text passwords being sent.

    Knowing you are currently connected to a switch you will attempt to perform an ARP poisoning attack that will let you look at all the packets and not only packets sent to your own machine.

    What would you call this type of sniffing?

    A. Passing Sniffing

    B. Active Sniffing

    C. ARP Sniffing

    D. All stations sniffing

  • Question 145:

    When a network switch receives a very large quantity of random MAC addresses which would overfill the Content Addressable Memory (CAM) table,how will the switch react?

    A. It will drop packets until the tables are cleard and then will resume normal processing.

    B. It will drop the oldest entries in theCAM table to make room for the new packets and will continue working normally

    C. It will revert to being a HUB and will broadcast all traffic on each of the ports

    D. It is impossible to flood the MAC tables because of their very large size.

  • Question 146:

    SQL injection is defined as?

    A. The gaining of access to an operating system by injecting code into a system process.

    B. The destruction of databases by mailicious code.

    C. The destruction of databases by malicious code.

    D. Altering data on a victims database server to that of a hackers choice.

  • Question 147:

    Select the best method of securing the underlying data tables on a database system.

    A. Create service accounts with the correct privileges for the action the user is carrying out, i.e.read only or full control.

    B. Allow only users to connect as the SA account.

    C. Create a service account with full access privilege over the underlying data tables.

    D. Allow only applications to interrogate a mirror of the database.

  • Question 148:

    Looking at the graphic below,determine what web site was visited by the user located at IP address 192.168.1.104?

    A. Netcraft.com

    B. Instacontent.net

    C. Geogle.com

    D. This sniffer capture is not from a web page request

  • Question 149:

    Which of the following scanning methods would be the most stealthy and best at hiding the source of a scan?

    A. TCP Connect()

    B. Syn-Ack

    C. Fin-Ack

    D. Idlescan

  • Question 150:

    TestKing.com has been getting numerous complaints that one of their employees has been actively probing remote DNS servers and attempting to extact information from them.

    After investigation it was detected that jack had used the nslookup command entensively and he also issued commands within nslookup such as server [remoteip]where[remoteip]is the IP address of the target he was probing.

    Further investigation also revealed that he used the command is d targetdomain.com where targetdomain.com was the ddomain name he was attempting to get more info about,what was jack really attempting to achieve in this case?

    A. See the UNIX permission of files

    B. Perform a zone transfer

    C. Perform a lookup on user and group permissions of files

    D. Perform a zone incremental query

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Mile2 exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your MK0-201 exam preparations and Mile2 certification application, do not hesitate to visit our Vcedump.com to find your solutions here.