Exam Details

  • Exam Code
    :MK0-201
  • Exam Name
    :Certified Penetration Testing Specialist (CPTS)
  • Certification
    :Mile2 Certifications
  • Vendor
    :Mile2
  • Total Questions
    :247 Q&As
  • Last Updated
    :May 09, 2025

Mile2 Mile2 Certifications MK0-201 Questions & Answers

  • Question 191:

    When referring to the prevalence of online computer crimes,which of the following would NOT be a factor that contributes to the proliferation or computer crimes?

    A. Widespread availability of computers

    B. Widespread availability of hacking tools

    C. The media and press coverage of incidents glamorizing hackers

    D. The laws and penalties associated with online crimes

  • Question 192:

    Why is it often recommended to rename the built-in Administrator account on a Windows 2000 domain? Choose the best answer.

    A. Renaming the Guest account is of little value.

    B. If you dont rename the Administrator account you will have NetBIOS name conflicts with the Administrator account from other domains in the forest.

    C. Account lockout will not stop password guessing attacks via SMB filesharing or BASIC web authentication against the built-in Administrator account .

    D. The default domain policy actually requires the Administrator account to be renamed.

  • Question 193:

    The SNMP protocol makes use of community sring to control access.There are two community strings being used; each of these strings allow you to perform only specific functions within the system being managed by SNMP.which of the following would represent the functions allowed by the two strings? Choose two)

    A. Public Gives public access to anyone to reconfigure the device

    B. Secret Gives read only access to the remote device being managed

    C. Public Gives read only access to the remote device being managed

    D. Private Gives read and write access to the remote device being managed

  • Question 194:

    Which programs might an attacker use to facililate sniffing in a switched network?Choose all that apply.

    A. Ettercap

    B. Cain and Abel

    C. MACof

    D. Etherflood

  • Question 195:

    Noah,a penetration tester,has been asked by TestKing.com to perform a security test against the company

    network from an internal location.

    The owner of TestKing.com has provided Noah with a network diagram,documentations,and assistance.

    Which of the following would best describe the type of test that Noah is about to perform?

    A. Black Box

    B. Zero Knowledge

    C. White Box

    D. Gray Box

  • Question 196:

    Which of the following would represent a technique to embed data within another file whereby it would be near impossible for anyone using or looking at the file to claim that there might be a message hidden within the media or the existence of some from of message?

    A. Cryptography

    B. Encryption

    C. Steganography

    D. MimiCry

  • Question 197:

    You have collected a series of messages that are all encrypted.

    You do not have access to the matching plaintext nor do you have any idea of the key and algorithm that

    were used to encrypt those messages.You will attempt a crypto attack in order to find the key. How would you call such an attack?

    A. chosen Plaintext Attack

    B. Known ciphertext attack

    C. Chosen Key Attack

    D. Cliphertext only attack

  • Question 198:

    Which Vulnerability Assessment tools perform dangerous/destructive scans.Choose two.

    A. MS Baseline Analyzer

    B. Nessus

    C. Snort

    D. X-Scan

  • Question 199:

    You are concerned about other people sniffing your data while it is travelling over your local network and the internet.

    Which of the following would be the most effective countermeauser to protect your data against sniffing while it is in transit?Choose the best answer.

    A. Encryption

    B. AntiSniff

    C. PromiScan

    D. Usage of a switch

  • Question 200:

    MS SQL server makes use of Stored Procedures.There is an extended stored procedure called sp_makewebtask that can be used with data being returned from executed queries.What would you use this stored procedure for?

    A. It is used to start a new web server instance

    B. It is used to create and HTML page

    C. It is used to perform an entry within a database

    D. It is used to schedule a job task

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Mile2 exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your MK0-201 exam preparations and Mile2 certification application, do not hesitate to visit our Vcedump.com to find your solutions here.