Exam Details

  • Exam Code
    :MK0-201
  • Exam Name
    :Certified Penetration Testing Specialist (CPTS)
  • Certification
    :Mile2 Certifications
  • Vendor
    :Mile2
  • Total Questions
    :247 Q&As
  • Last Updated
    :May 09, 2025

Mile2 Mile2 Certifications MK0-201 Questions & Answers

  • Question 21:

    Which of the following could be countermeasures to scanning?Choose all that apply.

    A. Drop all traffic destined directly at the firewall

    B. Disable all ICMP packets at exterior gateways

    C. Use a firewall ruleset that leads to many false positives and thus security through obscurity

    D. Permit UDP port 500 packets at the firewall

  • Question 22:

    Which of the following is the best method to counteract offline password cracking?Choose the best answer.

    A. Setting a password policy with a maximum age of 30 days

    B. Setting a password policy with a minimum age of 30 days

    C. Setting a password policy with a minimum length of 6 characters

    D. Use of one time passwords

  • Question 23:

    Bob has just produced a very detailed penetration testing report for his client.Bob wishes to ensure that the report will not be changed in storage or in transit.What would be the best tool that Bob can use to assure the integrity of the information and detect any changeds that could have happend to the report while being transmitted or stored?

    A. A Symmetric Encryption Algorithm

    B. An Asymmetric Encryption Algorithm

    C. An Hashing Algorithm

    D. The ModDetect Algorithm

  • Question 24:

    Which of these methods would be considered examples of active reconnaissance?(Choose three.)

    A. War dialing

    B. Firewalking

    C. Whois lookup

    D. FTP banner retrieval

  • Question 25:

    Cracking encryption is often impossible due to time constraints whereby it would take hundreds of years in some cases.

    Great advancement has taken place lately regarding the cracking of password based on the time memory trade-off.

    Such an attack allows an attacker to crack the password within a very short period of time.

    Under the memory trade-off technique,which of the followig would be used to speed the cracking of password?

    A. Large dictionaries

    B. Large collection of common passwords

    C. Pre Computed hashes tables

    D. Pre sorted dictionaries will most likely matches tried first

  • Question 26:

    What technology is often used by employees to get access to web sites that are blocked by their corporate proxy server?Choose the best answer.

    A. DNS spoofing

    B. ARP poisoning

    C. Anonymizers

    D. BASIC web authentication

  • Question 27:

    Vulnerabilities Scanners have large databases of known vulnerabilities and exposures that exist within a

    very large number of operating systems and applications.

    Most scanners are prone to false positive and in some cases false negative.

    The results presented by the scanners must be manually validated.

    What is one of the biggest disadvantages of automated security scanners when remaining stealthy is an

    issue?

    A. A very large amount of traffic will be sent against the target

    B. They can only test UDP based vulnerabilities

    C. The database is not regularly updated is most cases

    D. The scanner might require a large amount of memory,disk space,and processing power

  • Question 28:

    Pen testing is another area of security where acronyms and expressions abound. What does the term rooting refers to?

    A. Getting access to the root directory

    B. Getting administrator access on a Linux system

    C. Getting administrator access on a Windows system

    D. Planting a worm that will develop and grow within the system

  • Question 29:

    Detailed logging is the enemy of all cracers.

    After getting unauthorized access to a computer,a cracker will attempt to disable logging on the remote

    hosts that he compromises.

    In order to do so there are a few tools that could be used.

    Which of the following command lines would disable auditing on a Windows platform?

    A. auditpol/disable

    B. auditlog/disable

    C. auditpol/off

    D. auditlog/off

  • Question 30:

    You have been asked to assist an investigation team in collecting data and evidence related to an internal hacking case.

    The investigator in charge of the case would like to capture all keystrokes from the suspect but is afraid the employee under investigation who possesses great technical skills might have installed integrity tools on his system that would detect any new software installed.

    What solution would be best to use to reach the investigator requirement?

    A. Disable the integrity tools in place

    B. Install a software key logger that does not show in the process list

    C. Install a hardware based key logger

    D. Sniff all traffic and keystrokes from the network

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Mile2 exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your MK0-201 exam preparations and Mile2 certification application, do not hesitate to visit our Vcedump.com to find your solutions here.