CEH v9 Past Exam 1 - 60

CEH v9 Past Exam 1 - 60

Assessment

Assessment

Created by

Deleted User

Computers

Professional Development

138 plays

Medium

Student preview

quiz-placeholder

480 questions

Show answers

1.

Multiple Choice

30 sec

1 pt

Which of the following statements regarding ethical hacking is incorrect?

Ethical hackers should never use tools or methods that have the potential of exploiting vulnerabilities in an organization’s systems.

Testing should be remotely performed offsite.

An organization should use ethical hackers who do not sell vendor hardware/software or other consulting services.

Ethical hacking should not involve writing to or modifying the target systems.

2.

Multiple Choice

30 sec

1 pt

First thing you do every office day is to check your email inbox. One morning, you received an email from your best friend and the subject line is quite strange. What should you do?

Delete the email and pretend nothing happened.

Forward the message to your supervisor and ask for her opinion on how to handle the situation.

Forward the message to your company’s security response team and permanently delete the message from your computer.

Reply to the sender and ask them for more information about the message contents.

3.

Multiple Choice

30 sec

1 pt

Bob received this text message on his mobile phone: ““Hello, this is Scott Smelby from the Yahoo Bank. Kindly contact me for a vital transaction on: scottsmelby@yahoo.com””. Which statement below is true?

This is probably a legitimate message as it comes from a respectable organization.

Bob should write to scottsmelby@yahoo.com to verify the identity of Scott.

This is a scam as everybody can get a @yahoo address, not the Yahoo customer service employees.

This is a scam because Bob does not know Scott.

4.

Multiple Choice

30 sec

1 pt

In many states sending spam is illegal. Thus, the spammers have techniques to try and ensure that no one knows they sent the spam out to thousands of users at a time. Which of the following best describes what spammers use to hide the origin of these types of e-mails?

A blacklist of companies that have their mail server relays configured to allow traffic only to their specific domain name.

Mail relaying, which is a technique of bouncing e-mail from internal to external mails servers continuously.

A blacklist of companies that have their mail server relays configured to be wide open.

Tools that will reconfigure a mail server’s relay component to send the e-mail back to the spammers occasionally.

5.

Multiple Choice

30 sec

1 pt

Bob, your senior colleague, has sent you a mail regarding a deal with one of the clients. You are requested to accept the offer and you oblige. After 2 days, Bob denies that he had ever sent a mail. What do you want to know to prove yourself that it was Bob who had send a mail

Integrity

Confidentiality

Authentication

Non-Repudiation

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Find a similar activity

Create activity tailored to your needs using

Quizizz AI