Exam Details

  • Exam Code
    :MK0-201
  • Exam Name
    :Certified Penetration Testing Specialist (CPTS)
  • Certification
    :Mile2 Certifications
  • Vendor
    :Mile2
  • Total Questions
    :247 Q&As
  • Last Updated
    :May 09, 2025

Mile2 Mile2 Certifications MK0-201 Questions & Answers

  • Question 241:

    Bryce, who is a great security professional with a perfect track record,has just been called into his supervisor's office.

    His supervisor has the sad task of letting him know that hes the next position being cut in their downsizing effort.Bryce has been known to be a mellow type of person but the version of being unemployed after working for 25 years at the same company is just a bit too much for him.He cannot understand why newer employees with only a few years of experience have not been fired before him and why he is the one that must leave.Bryce tells himself that is employer is going to pay dearly for this and hes planning to use his skills to cause disruption within the company infrastructure.

    Which of the following term would best describe the reaction of Bryce?

    A. Cracker

    B. Disgruntied Employee

    C. Ethical Hacker

    D. Revenge Master

  • Question 242:

    Which of the following tools can detect hidden Alternative Data Streams on an NTFS file or folder? Choose all that apply.

    A. Lns.exe

    B. Lads.exe

    C. FileAlyzer

    D. ADSCheker

  • Question 243:

    In order to idnetify a unique record within a database what would you use?

    A. A foreign key

    B. A primary key

    C. A view

    D. A unique key

  • Question 244:

    One of the last steps taken by an attacker will be to configure permanent access to a compromised system.

    However, the installation of a backdoor, installation of new processes,and changes to key files could be very quickly detected by an administrator.

    What tool would assist the attacker in preventing the administrator from detecting changes to files,new processes that are running,or other signs that the system might have been compromised?

    A. A Trojan horse

    B. A Rootkit

    C. A Backdoor

    D. A privilege escalation tool

  • Question 245:

    Which of the following statements would best describe the act of signing a message with a Digital Signature?

    A. The sender creates a hash value of the message he wishes to send He uses his private key to encrypt the hash value. The message and the encrypted hash value are sent to the receiver.

    B. The sender creates a hash value of the message he wishes to send. He uses his public key to encrypt the hash value. The message and the encrypted has value are sent to the receiver.

    C. The sender creates a hash value of the message he wihes to send. The message and the hash value are sent to the receiver.

    D. The sender uses his public key to create a digital signature. The digital signature is sent along with the text message. The receiver will use the sender private key to validate the signature.

  • Question 246:

    Why is it so challenging to block packets from Remote Access Troans that use port 80 for network communications?Choose three.

    A. To a firewall,the traffic appears simply to be from an internal user making an innoccous HTTP GET request.

    B. Port 80 outbound is normally open on corporate firewalls

    C. Stateful inspection firewalls will block unsolicited inbound HTTP GET requests

    D. Not all firewalls are capable of inspecing data in the HTTP data fields for evidence of tunneling

  • Question 247:

    You have just attempted to perform DNS poisoning on the local network DNS server and did not succeed;you decide to launch an attack against routing tables instead.

    Which of the following would NOT be an effective way of attempting to manipulate the routing table on the local network or through its gateway?

    A. By using a source route attack

    B. By using ICMP redirect messages

    C. By adverstising bogus OSDF routes

    D. By advertising bogus RIP routes

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Mile2 exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your MK0-201 exam preparations and Mile2 certification application, do not hesitate to visit our Vcedump.com to find your solutions here.