Which of the following countermeasures can make it more difficult for an attacker to gain access to the local SAM file if the attacker has physical access to that computer?Choose two.
A. Change the BIOS to always boot first from the hard drive and enable a BIOS password
B. Install a smartcard reader for login
C. Encrypt the SAM file using EFS
D. Physically remove the floppy drive and CD/DVD drives
When talking about databases search query languages,commands such as Select,Update,Insert,Grant,and Revoke would all the part of what language?
A. C++
B. SQL
C. Python
D. Perl
Which of the following would best represent the definition of a Penetration Test?
A. Testing of the effectiveness of applied security controls by breaking in and bypassing them.
B. Testing of the policies in place to see how compliant a company is with its own control definition.
C. Testing the effectiveness of applied security controls by evaluating vulnerabilities and reporting them to the client.
D. Testing the effectiveness of access control mechanisms by constant and deep inspection of all log files.Also called Deep Packet Inspection.
One of the challenges when doing large scale security tests is the time required.
If you have to scan a class B network it might take you a very long time. Scanrand is a tool that has been optimized to scan a large number of hosts in very little time.It was reported that it was used to scan about 8300 web servers in less than 4 seconds.
How does scanrand achieve such an impressive benchmark?
A. It does not maintain any state
B. It makes use of multiple Network Interface Cards (NIC)
C. It has a probabilistic algorithm that can predict if a port is open or not
D. It does not attempt to use UDP due to the overhead involved
What is the most secure method of implementing Software Restriction Policies to prevent users from running both unauthorized and undesirable software?Choose the best answer.
A. Define a policy to permit software found only in specified paths and disallow all else
B. Define a policy to permit software based only upon specified filenames and disallow all else
C. Define a policy to permit all software except those based upon specified filenames
D. Define a policy to permit software only based upon specified executable hashes and disallow all else
Keen administrators (the enemy of penetration testers)will take great steps in order to collect logs on different servers.By having a detailed log of activities they may be able to detect abnormal activities.
A skilled intruder will attempt to modify the logging policy in order to prevent the administrator from having access to his detailed log.What command line tool could an attacker use to disable auditing on a Windows server?
A. Syslog
B. Eventlog
C. Auditpol
D. Auditlog
You have successfully exploited a remote computer.You now have limited privilege on the remote computer.
You tests have revealed that it is possible to download files from the internet but the size of the limited to less than 60K.
You would like to escalate your privilege by scanning the internal network and also setup a permanent backdoor that would allow you to return to the compromised host at will.
Which of the following tools could be used for such purpose?
A. Hijack This
B. Netcat
C. ButtSniff
D. BackOrifice
Todays security infrastructures are composed of firewall,instrusion detection systems,content
screening,certificates,tokens,and a lot more.
Howeve,there is still one aspect that is considered to be weak link in all infrastructures.
Which of the following would represent this weak link?
A. Bad hardware
B. Bad software
C. People
D. Process
A null session allows users to connect remotely to other Windows computers on the network.According to the implementation of NULL Session on Windows platforms,how long would the password be in order to establish a NULL Session?
A. At least 8 Characters
B. A passphrase is used not a password
C. There is no password involved
D. Windows makes use of Digital Signature in such case,not passwords
Which of the following are reasons why LAN Manager hashes stored in the SAM file are considered relatively easy to crack?Choose two.
A. All uppercase characters in the password are converted to all lowercase
B. All lowercase characters in the password are converted to all uppercase
C. The password is broken cannot contain special characters
D. Lan Manager password cannot contain special characters
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Mile2 exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your MK0-201 exam preparations and Mile2 certification application, do not hesitate to visit our Vcedump.com to find your solutions here.