When referring to the prevalence of online computer crimes,which of the following would NOT be a factor that contributes to the proliferation or computer crimes?
A. Widespread availability of computers
B. Widespread availability of hacking tools
C. The media and press coverage of incidents glamorizing hackers
D. The laws and penalties associated with online crimes
Why is it often recommended to rename the built-in Administrator account on a Windows 2000 domain? Choose the best answer.
A. Renaming the Guest account is of little value.
B. If you dont rename the Administrator account you will have NetBIOS name conflicts with the Administrator account from other domains in the forest.
C. Account lockout will not stop password guessing attacks via SMB filesharing or BASIC web authentication against the built-in Administrator account .
D. The default domain policy actually requires the Administrator account to be renamed.
The SNMP protocol makes use of community sring to control access.There are two community strings being used; each of these strings allow you to perform only specific functions within the system being managed by SNMP.which of the following would represent the functions allowed by the two strings? Choose two)
A. Public Gives public access to anyone to reconfigure the device
B. Secret Gives read only access to the remote device being managed
C. Public Gives read only access to the remote device being managed
D. Private Gives read and write access to the remote device being managed
Which programs might an attacker use to facililate sniffing in a switched network?Choose all that apply.
A. Ettercap
B. Cain and Abel
C. MACof
D. Etherflood
Noah,a penetration tester,has been asked by TestKing.com to perform a security test against the company
network from an internal location.
The owner of TestKing.com has provided Noah with a network diagram,documentations,and assistance.
Which of the following would best describe the type of test that Noah is about to perform?
A. Black Box
B. Zero Knowledge
C. White Box
D. Gray Box
Which of the following would represent a technique to embed data within another file whereby it would be near impossible for anyone using or looking at the file to claim that there might be a message hidden within the media or the existence of some from of message?
A. Cryptography
B. Encryption
C. Steganography
D. MimiCry
You have collected a series of messages that are all encrypted.
You do not have access to the matching plaintext nor do you have any idea of the key and algorithm that
were used to encrypt those messages.You will attempt a crypto attack in order to find the key. How would you call such an attack?
A. chosen Plaintext Attack
B. Known ciphertext attack
C. Chosen Key Attack
D. Cliphertext only attack
Which Vulnerability Assessment tools perform dangerous/destructive scans.Choose two.
A. MS Baseline Analyzer
B. Nessus
C. Snort
D. X-Scan
You are concerned about other people sniffing your data while it is travelling over your local network and the internet.
Which of the following would be the most effective countermeauser to protect your data against sniffing while it is in transit?Choose the best answer.
A. Encryption
B. AntiSniff
C. PromiScan
D. Usage of a switch
MS SQL server makes use of Stored Procedures.There is an extended stored procedure called sp_makewebtask that can be used with data being returned from executed queries.What would you use this stored procedure for?
A. It is used to start a new web server instance
B. It is used to create and HTML page
C. It is used to perform an entry within a database
D. It is used to schedule a job task
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Mile2 exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your MK0-201 exam preparations and Mile2 certification application, do not hesitate to visit our Vcedump.com to find your solutions here.