What technology has made trojans easy to distribute?Choose the best answer.
A. Digitally Signed Software
B. Assembly language
C. EXE wrappers
D. Personal firewall software
Which of the following SQL scripts will discover the usernames and hashed passwords from a MSSQL server?
A. SELECT *FROM*
B. SELECT name,password FROM master..login UNION ALL SELECT *FROM database.log
C. SELECT name,password FROM master..sysxlogins
D. SELECT uname AND passwd FROM master
Which of the following password and encryption cracking methods is guaranteed to successfully crack any password or encryption algorithm?
A. Dictionary
B. Hybrid
C. Brute Force
D. RainbowCrack
Which of the following countermeasures could be taken to implement security through obscurity and thus limit reconnaissance if an attacker issues this command against a web server? Choose the best answer.
nc www.domain.com 80
GET HEAD HTTP/1.1
[return]
[return]
A. Change the default error messages
B. Change the webservers banner
C. Enable SYN flood protection on a capable firewall
D. Change the default homepage
Which of the following capabilities do rootkits have?Choose all that apply.
A. Hide any file
B. Hide any process
C. Hide any listening port
D. Cause a blue screen of death on Windows computers.
This document, which is a part of good practices within an organization,describes step by step how to accomplish a specific task.What is the name of this document?
A. Procedures
B. Guidelines
C. Policies
D. Recommendations
Looking at the Window presented below,what type of mail server is running on the remote host?
A. Exchange 8.13.4
B. Hotmail 8.13.4
C. Sendmail 8.13.4
D. Exim Mail 8.13.4
On a Linux system,which of the following files would contain the list of user accounts,their shell,and their home directories?
A. useradd
B. shadow
C. passwd
D. group
Why is tunneling-based trojan software so useful for hackers if it is installed inside a corporate network? Choose the best answer.
A. Tunneling software uses ports that are not well knwon,eg.12345
B. Stateful inspection firewalls can only filter Server ports of 1-1023
C. It makes network penetration trivial the tunneling occurs using Whatever port(s) the firewall is configured to allow
D. Anti-trojan software do not have signatures for tunneling trojans,therefore it is easy to have end- users install tunneling trojans.
Under the Windows platform,there is something refered to as Null Session.
Which of the following statements would best describe what a null session consists of?
A. It is a session where zero bytes of traffic have been transferred
B. It is a session where erroneous commands are being used showing the a lack of knowledge of the user connected.
C. It is a remote session that is established anonymously to a window machine
D. It is a anonymous FTP session under the Windows platform
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Mile2 exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your MK0-201 exam preparations and Mile2 certification application, do not hesitate to visit our Vcedump.com to find your solutions here.