Computers

Professional Development

Image

CEH v9 Past Exam 1 - 60

138
plays

480 questions

Show Answers
See Preview
  • 1. Multiple Choice
    30 seconds
    1 pt

    Which of the following statements regarding ethical hacking is incorrect?

    Ethical hackers should never use tools or methods that have the potential of exploiting vulnerabilities in an organization’s systems.

    Testing should be remotely performed offsite.

    An organization should use ethical hackers who do not sell vendor hardware/software or other consulting services.

    Ethical hacking should not involve writing to or modifying the target systems.

  • 2. Multiple Choice
    30 seconds
    1 pt

    First thing you do every office day is to check your email inbox. One morning, you received an email from your best friend and the subject line is quite strange. What should you do?

    Delete the email and pretend nothing happened.

    Forward the message to your supervisor and ask for her opinion on how to handle the situation.

    Forward the message to your company’s security response team and permanently delete the message from your computer.

    Reply to the sender and ask them for more information about the message contents.

  • 3. Multiple Choice
    30 seconds
    1 pt

    Bob received this text message on his mobile phone: ““Hello, this is Scott Smelby from the Yahoo Bank. Kindly contact me for a vital transaction on: scottsmelby@yahoo.com””. Which statement below is true?

    This is probably a legitimate message as it comes from a respectable organization.

    Bob should write to scottsmelby@yahoo.com to verify the identity of Scott.

    This is a scam as everybody can get a @yahoo address, not the Yahoo customer service employees.

    This is a scam because Bob does not know Scott.

  • Answer choices
    Tags
    Answer choices
    Tags

    Explore all questions with a free account

    Already have an account?