Most search engine support Advanced Search Operators; as a Penetrtion Tester you must be familiar with some of the larger search engines such as Geogle.There is a wealth of information to be gathered from these public databases.Which of the following operators would you use if you attempt to find an older copy of a website that might have information which is no longer available on the target website?
A. Link:
B. InCache:
C. Cache:
D. Related:
Billybastard.c and pipeupadmin are examples of what type of attack?Choose the best answer.
A. Denial of service
B. Privilege escalation
C. FTP bounce
D. SQL Injection
What are some of the weaknesses that make LAN Manager Hashes much easier to crack by an attacker? (Select all that apply)
A. The 14 character password is split in two
B. The password is converted to Uppercase
C. The hash value is encrypted using MD5
D. The hash value is encrypted with AES
Johny has been trying to defeat a crypto system for some time. He has in his possession a whole
collection of ciphertext documents that were captured from the network.
However,he does not know what algorithm or plain text was used to create this ciphertext.
Through statistical analysis he is attempting to decipher the encrypted text.
What would you call such an attack?
A. Known Plaintext attack
B. Ciphertext Only Attack
C. Chosen Ciphertext Attack
D. Chosen Plaintext Attack
What techniques are often used to perform an active-stack fingerprint of an operating system?Choose all that apply.
A. TCP Window and ACK sampling
B. TCP sequence number sampling
C. ICMP Echo integrity
D. IP Type of Service sampling
Which of the following SQL script will cause the SQL server to cease operations?
A. NET STOP SQLSERVER
B. OR 1=1; CLOSE WITHNOWAIT;
C. NET STOP SQLSERVERAGENT
D. SHUTDOWN WITH NOWAIT;
The Advanced Encryption Standard (AES) was released to protect sensitive data used by
A. S.Government organizations. Up to what classification level was AES built for?
B. Up to Top Secret
C. Up to Secret
D. Up to Confidential
E. Unclassified Information Only
You are the security administrator of TestKing.com Inc.
You have noticed that one of your users has installed a tool named KerbCrack as well as another tool
named KerbSniff on his machine withou your authroization.
The company is making use of active directory to store its users database.
What would these two tools be used for?
A. To attempt sniffing passwords off the network and then crack them
B. To capture Kerberos packets and then attempt a brute force attack
C. To connect to encrypted peer to peer networks
D. To administer the Kerberos portion of Active Directory
What is one possible method that hackers can use to sniff SSL connections?Choose the best answer.
A. Use dsniff
B. Act as a man in the middle between the client and the webserver and send the client a fake certificate that the user will accept as legitimate
C. Use SSLSniff to sniff the session key exchange
D. Use SSL Relay
The process of flooding a local segment with thousands of random MAC addresses can result in some switches behaving like a hub.The goal of the hacker is to accomplish what?Choose the best answer.
A. Denial of service
B. ARP cache poisoning
C. Sniffing in a switched network
D. SYN flood
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Mile2 exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your MK0-201 exam preparations and Mile2 certification application, do not hesitate to visit our Vcedump.com to find your solutions here.