What technology has made trojans easy to distribute?Choose the best answer.
A. Digitally Signed Software
B. Assembly language
C. EXE wrappers
D. Personal firewall software
System administrators need to be aware of what tool that adds while-bytes of executable code to an existing malicious binary with the goal of evading anti-trojan software using MD5 and CRC checksums? Choose the best answer.
A. ProDetect
B. RegMon
C. ADMutate
D. Stealth Tools v.2.0
Which of the following would best describe the meaning of steganography?
A. The art and science of hiding information by embedding messages within other,seemingly harmless messages
B. The art and science of hiding information by encrypting it with a symmetric cipher where the key will be used only once
C. The art and science of hiding information by encrypting it using a public key encryption system where the key pair will be used only once
D. The art and science of hiding information by embedding redundant data within the primary data and then using XOR against the stream
On 802.11x Wireless Local Area Network,what is the effective length of the keys being used?
A. 64 bit and 128 bits
B. 128 bit
C. 56 and 104 bits
D. 104 and 128 bits
Spyware is either hardware or software installed on a computer which gather information about the user for later retrieval by whoever controls the Spyware.
It is installed without the users knowledge.
What are the two categories of Spyware that exist?(Choose two from the list below)
A. Surveillance
B. Screen capture
C. key loggers
D. Advertising
This document is a high level document that describes management intentions towards security.What is the name of the document?
A. Procedures
B. Guidelines
C. Policies
D. Baselines
DNS Spoofing can allow an attacker to sniff traffic that is meant to go to particular web sites.Which of the following tools can perform DNS Spoofing?Choose two.
A. Cain and Abel
B. LC5
C. WinDNSSpoof
D. URLSnarf
Which of the following is NOT a tool that could be used to perform a zone transfer?
A. DIG
B. Host
C. Nslookup
D. WHOIS
Why are Trojans such as Beast a lot harder to detect? Choose the best answer.
A. They use a well known name to hide themselves
B. They inject themselves into another process
C. They have a polymorphic payload
D. They are self garbling and cannot be detected
Doing Operating System identification remotely is an art that requires analysis of responses from packets being sent.In order to do so efficiently,a methodology called fuzzy logic is often used. Which of the following would best describe what fuzzy logic is?
A. A problem solving control system
B. A special type of port scan
C. An operating system feature
D. A hardware device for OS identification
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Mile2 exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your MK0-201 exam preparations and Mile2 certification application, do not hesitate to visit our Vcedump.com to find your solutions here.