Want to pass your CPTS - Certified Pen Testing Specialist MK0-201 exam in the very first attempt? Try Pass2lead! It is equally effective for both starters and IT professionals.
VCE
On Wireless networks, what is the Service Set Identify used for?
A. It is the network password
B. It is used on the primary key for WEP
C. It is used to distinguish one network from another
D. It is used to authenticate clients.
What is the most secure method of implementing Software Restriction Policies to prevent users from running both unauthorized and undesirable software?Choose the best answer.
A. Define a policy to permit software found only in specified paths and disallow all else
B. Define a policy to permit software based only upon specified filenames and disallow all else
C. Define a policy to permit all software except those based upon specified filenames
D. Define a policy to permit software only based upon specified executable hashes and disallow all else
Which of the following would best represent the definition of a Penetration Test?
A. Testing of the effectiveness of applied security controls by breaking in and bypassing them.
B. Testing of the policies in place to see how compliant a company is with its own control definition.
C. Testing the effectiveness of applied security controls by evaluating vulnerabilities and reporting them to the client.
D. Testing the effectiveness of access control mechanisms by constant and deep inspection of all log files.Also called Deep Packet Inspection.