On Wireless networks, what is the Service Set Identify used for?
A. It is the network password
B. It is used on the primary key for WEP
C. It is used to distinguish one network from another
D. It is used to authenticate clients.
Which are methods that attackers use to find buffer overflows?Choose all that apply.
A. Trial and error
B. Decompile the executable binary of the application
C. Decompile the executable binary of a software patch
D. Analyze source code,if available
When dealing with Wireless Local Area Networks a client will associate with the closest access point.What does the closest access point mean in such a case?
A. The access point that is geographically located the closest to the client
B. The access point that has the strongest signal received by the client
C. The access point that has a frequency that is the closest to the frequency used by the client
D. The access point that has the least number of client connected at the specific time.
Nathalie has just received a message from her boyfriend,Clement,who is telling her about this severe Popoute virus that none of the virus companies have been able to stop.
In the same message Clement is asking her to pass the message along to anyone she can in order to ensure they will protect themselves before infection.After validating with her IT department it becomes obvious that there was no virus named Popoute that ever existed and that resources have been wasted by the large amount of emails that were sent and time wasted.
What would you call such activities?
A. A joke
B. A hoax
C. A Worm
D. A Troan
Wireless Local Area Networks (WLAN) are becoming increasingly popular.
In order to link a wireless network to a wired network what type of device would be used?
A. SSID
B. Access Point
C. Switch
D. Hub
Which of the following resource records would you inspect to find out how long a cache poisoning attack might be effective against a remote DNS server?
A. MX
B. NS
C. SOA
D. PTR
Bob is doing a penetration test.
He was able to get system level access on one of the servers exploiting one of the known weaknesses of
the web server.
Bob attempted to copy the SAM database but it was locked and his operation was not allowed.
How could Bob succeed in getting a copy of the SAM database if it locked while the system is up and
running?
A. By bringing the system to single user mode
B. By running samdumpt to create a backup of the SAM
C. By running rdisk /s to create an unlocked backup copy of the SAM
D. By changing the permissions on the file using his System privileges
Which of the following scan types would be the least accurate scan considering that may other network conditions could indicate that the port is open even though it might not be open?
A. Vanilla TCP Port Scan
B. UDP Port Scan
C. Half-Open Scan
D. Inverse TCP Scan
When would a secondary name server perform a zone transfer to update its entries and synchronize its database with the primary name server?
A. At random intervals
B. When instructed to do so
C. When its serial number is lower than the primary DNS server
D. When its Time To Live value is lower than the primary DNS server
Footprinting is one of the first steps performed by a Penetration Tester.
Many security testers neglect to perform this phase whereby you have the opportunity to easily information that can later be matched with technical discovery to give you a greater assurance in your finding. Which of the following would NOT be doen in the footprinting phase?
A. Collecting DNS registration information
B. Finding network IP addresses range in public DB
C. Maintaining Access
D. Visiting and querying the Security Exchange Commission database.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Mile2 exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your MK0-201 exam preparations and Mile2 certification application, do not hesitate to visit our Vcedump.com to find your solutions here.