Joshua, a specialist in Penetration Testing,has been hired by TestKing.com to perform a security test on some of their servers.Joshua has been challenged to remain undetected by TestKing.com internal security team.
Over the past few days Joshua has been collecting tons of information about his target.He did so by accessing public database and never sending any packets to his target.How would you call this type of information gathering?
A. Active Information Gathering
B. Passive Information Gathering
C. Stealth Information Gathering
D. Secret Information Gathering
Bob has accessed a nice site that sells high end wireless network equipment.
However,after looking around for a while it was obvious that most items were too expensive for his low income salary.
After fidding around for a while,he identified that modifying some of the page variables would allow him to modify the price easily and then he could save the page locally and resubmit the page in order to get a significant rebate.What weakness within the page code did he use to perform his attack?
A. HTML code
B. Hidden From Field code
C. Java Code
D. ActiveX
BASIC authentication for HTTP authentication is universally understood but has the disadvantage of passing username and password in BASE64 encoding.What technology could be used to encrypt the BASE64 encoding and thus secure BASIC authentication for all web browsers and all Internet users? Choose the best answer.
A. SSH
B. IPsec
C. SSL
D. IKE
Julius has been hired to perform a test on TestKing.com networks.
Julius knows that TestKing.com has a large team of security administrators who are very proactive in their security approach. Most likely there are some Intrusion Detection Systems (IDS) in place that would quickly identify Julius IP
address and he would then be blocked from accessing the network he is supposed to test.
How can Julius avoid having his IP address identified and then blocked?
Which of the following would be the most practical solution and the easiest to implement?
A. By using public key encryption;it is well known that IDS cannot make any sense of encrypted traffic and they would not be able to determine the source of the probes
B. By using Secure Socket Layer (SSL) Which will shield the intruder from the IDS and they wont be able to determine the source of the probes
C. By using only computers within the local internet caf.All traffic will be traced to the internet caf instead of being traced to the security tester
D. By using an internet anonymizer instead of connecting directly to the target.The anonymizer will shield the real source of the probes.
Password attack fall within two main categories:Social Attacks and Digital Attacks. Which of the following would not be considered a Social Attack on passwords?
A. Social Engineering
B. Shoulder Surfing
C. Dumpster Diving
D. Dictionary Attack
John is attempting to reduce the likelihood that his Linux server could be compromised through exploitation of ports and services that are not necessary or through the use of packets that might be out of state,modified,or malicious.His first step will be to configure the built in firewall that exists on the recent Linux version. What is the name of the user space program used to configure this firewall?
A. IPChains
B. IPwall
C. IPTables
D. IPFW
A Denial of Service (DoS) attack can have severe effect on a company network or systems.What is the main purpose of a DoS attack?Choose the best response.
A. To compromise a remote system
B. To disallow access from legitimate users
C. To disallow access from illegitimate users
D. To create a lot of log entries
Which of the following pieces of information can be obtained from a Whois query?Choose all that apply.
A. Technical point of contact
B. Authoritative DNS servers
C. Private IP Address block
D. Public IP address block
Why is it often recommended to rename the built-in Administrator account on a Windows 2000 domain? Choose the best answer.
A. Renaming the Guest account is of little value
B. If you dont rename the Administrator account you will have NetBIOS name conflicts with the Administrator account from other domains in the forest
C. Account lockout will not stop password guessing attacks via SMB filesharing or BASIC web authentication against the built-in Administrator account
D. The default domain policy actually requires the Administrator account to be renamed
While performing a penetration test you discover that the system being tested is already compromised by an intruder.Further examination shows the intruder being currently on the system and doing his deeds.As a Certified Penetration Testing Specialist What should you do?
A. Retaliate immediately and attempt to break into the attacker system before you loose track of where he is doing the attack from.
B. Suspend your test immediately and advise your client.Once the client gives you authorization you would resume your testing.
C. Immediately attempt to gather as much information as possible about the intruder,monitor his moves very closely but never attempt to break into this system or retaliate.
D. Call 911 immediately and then call management to notify them of your promptaction.Once management gives you authorization you can resume your testing.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Mile2 exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your MK0-201 exam preparations and Mile2 certification application, do not hesitate to visit our Vcedump.com to find your solutions here.