What built-in Windows command can be used to help find remote access trojans?Choose the best answer.
A. Netstat a
B. Ipconfig/displaydns
C. Nbtstat c
D. Netdiag
Mae i a keen system administration; she constantly monitors the mailing list for best practices that are being used out in the field.On the servers that she maintains,Mae has renamed the administrator account to another name to avoid abuse from crackers.However,she found out that it was possible using the sid2user tool to find the new name she used for the administrator account.Mae does not understand; she has NOT shared this name with anyone.How can this be?What is the most likely reason?
A. Her system have been compromised
B. Renaming the administrator account does not change the SID
C. She has not applied all of the patches
D. Someone social engineered her
When doing a Half-Open Scan what packet type would be expected as a response if the port being probed is closed?
A. FIN
B. ACK
C. RST
D. RST/ACK
Ping utilities can be used for basic network connectivity test; the ping command sends out an ICMP Echo Request packets and the destination host will reply with an ICMP Echo Reply packets if the host is alive.
However,in some cases the host might be alive and responses are not received.What is the most likely cause of such behavior?
A. The packet suffers from time exceeded in transit
B. The packet did not reach the destination gateway
C. A filtering device is dropping the packets
D. The remote device OS does not support the ping command.
Software Restriction Policies,if implemented correctly,can help protect against what kinds of threats? Choose two.
A. Trojans
B. Malware
C. Spam
D. Smurf Attacks
If the DS Client software has been installed on Windows 95,Windows 98,and NT 4 comptuers,what setting of the LanMan Authentication level should be applied to counteract LanMan hash sniffing and offline cracking? Choose the best answer.
A. Send NTLM v2/Refuse LM and NTML
B. Send NTLM only
C. Send LM and NTLM responses
D. Send NTLM v2/Refuse LM
Using Netcat what would be the syntax to setup a listening back door from a compromised Windows Server that will spawn a shell when connecting to the remote server on port 777?
A. nc |p 777 e cmd.exe
B. nc sh p 777 e cmd.exe
C. nc |p 777 sh cmd.exe
D. nc |p 777 exec cmd.exe
Duane is a clever attacker,he has penertrated a system and wishes to hide some files within other files on the file system.Which of the following could be used by Duane to attempt hiding files within the file system?
A. Attrib
B. HideNSeek
C. Chgrp
D. Alternate Data Stream
Which of the following penetration framework is Open Source and offers features that are similar to some of its rival commercial tools?
A. CANVAS
B. CORE IMPACT
C. METASPLOIT
D. DEEP HOLE
Why is it important to the security of a network to create a complex password for the SA account on a MSSQL server installation?
A. The SA account is a pseudo-account and does not have any privileges.
B. The SA account can add/delete or change Domain User accounts.
C. The SA account can have privileges of the local adminstrators group on the host OS.
D. The SA account is the most powerful account on the domain controller.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Mile2 exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your MK0-201 exam preparations and Mile2 certification application, do not hesitate to visit our Vcedump.com to find your solutions here.