Free MK0-201 Exam Braindumps


  • Exam Code: MK0-201
    Exam Title: MK0-201 Certified Penetration Testing Specialist (CPTS )
  • Exam Provider: Mile2
  • Exam Questions: 247
  • Updated On: 2-Feb-2025
QUESTION: 1
You have just attempted to perform DNS poisoning on the local network DNS server and did not
succeed;you decide to launch an attack against routing tables instead. Which of the following
would NOT be an effective way of attempting to manipulate the routing table on the local
network or through its gateway?

A. By using a source route attack
B. By using ICMP redirect messages
C. By adverstising bogus OSDF routes
D. By advertising bogus RIP routes

Answer(s): C
QUESTION: 2
Why is it so chal enging to block packets from Remote Access Troans that use port 80 for
network communications?Choose three.

A. To a firewall, the traffic appears simply to be from an internal user making an innoccous
HTTP GET request.
B. Port 80 outbound is normally open on corporate firewalls
C. Stateful inspection firewal s will block unsolicited inbound HTTP GET requests
D. Not all firewalls are capable of inspecing data in the HTTP data fields for evidence of
tunneling

Answer(s): A, B, D
QUESTION: 3
Which of the following statements would best describe the act of signing a message with a
Digital Signature?

A. The sender creates a hash value of the message he wishes to send He uses his private key
to encrypt the hash value.
The message and the encrypted hash value are sent to the receiver.
B. The sender creates a hash value of the message he wishes to send.
He uses his public key to encrypt the hash value.
The message and the encrypted has value are sent to the receiver.
C. The sender creates a hash value of the message he wihes to send.
The message and the hash value are sent to the receiver.
D. The sender uses his public key to create a digital signature.
The digital signature is sent along with the text message.

The receiver wil use the sender private key to validate the signature.

Answer(s): A
QUESTION: 4
One of the last steps taken by an attacker wil be to configure permanent access to a
compromised system.





Post your Comments and Discuss Mile2 MK0-201 exam with other Community members:

MK0-201 Exam Discussions & Posts