
CEH v9 Past Exam 1 - 60

Assessment
•

Deleted User
•
Computers
•
Professional Development
•
138 plays
•
Medium
Student preview

480 questions
Show answers
1.
Multiple Choice
Which of the following statements regarding ethical hacking is incorrect?
Ethical hackers should never use tools or methods that have the potential of exploiting vulnerabilities in an organization’s systems.
Testing should be remotely performed offsite.
An organization should use ethical hackers who do not sell vendor hardware/software or other consulting services.
Ethical hacking should not involve writing to or modifying the target systems.
2.
Multiple Choice
First thing you do every office day is to check your email inbox. One morning, you received an email from your best friend and the subject line is quite strange. What should you do?
Delete the email and pretend nothing happened.
Forward the message to your supervisor and ask for her opinion on how to handle the situation.
Forward the message to your company’s security response team and permanently delete the message from your computer.
Reply to the sender and ask them for more information about the message contents.
3.
Multiple Choice
Bob received this text message on his mobile phone: ““Hello, this is Scott Smelby from the Yahoo Bank. Kindly contact me for a vital transaction on: scottsmelby@yahoo.com””. Which statement below is true?
This is probably a legitimate message as it comes from a respectable organization.
Bob should write to scottsmelby@yahoo.com to verify the identity of Scott.
This is a scam as everybody can get a @yahoo address, not the Yahoo customer service employees.
This is a scam because Bob does not know Scott.
4.
Multiple Choice
In many states sending spam is illegal. Thus, the spammers have techniques to try and ensure that no one knows they sent the spam out to thousands of users at a time. Which of the following best describes what spammers use to hide the origin of these types of e-mails?
A blacklist of companies that have their mail server relays configured to allow traffic only to their specific domain name.
Mail relaying, which is a technique of bouncing e-mail from internal to external mails servers continuously.
A blacklist of companies that have their mail server relays configured to be wide open.
Tools that will reconfigure a mail server’s relay component to send the e-mail back to the spammers occasionally.
5.
Multiple Choice
Bob, your senior colleague, has sent you a mail regarding a deal with one of the clients. You are requested to accept the offer and you oblige. After 2 days, Bob denies that he had ever sent a mail. What do you want to know to prove yourself that it was Bob who had send a mail
Integrity
Confidentiality
Authentication
Non-Repudiation
Explore all questions with a free account
Find a similar activity
Create activity tailored to your needs using