tutorialpoint.org

Engg. tutorials

  • Instrumentation and Control Lab
  • Control systems assignment
  • Shape memory alloy SMA actuator
  • Dielectric elastomer
  • EM theory lecture notes
  • GATE question papers
  • JAM question papers
  • Kalman filter tutorial
  • Nonlinear estimation
  • Certified Ethical Hacker (CEHv9) Questions and answers

    67. When you return to your desk after a lunch break, you notice a strange email in your inbox. The sender is someone you did business with recently, but the subject line has strange characters in it. What should you do?

    A. Forward the message to your company's security response team and permanently delete the message from your computer.

    B. Reply to the sender and ask them for more information about the message contents.

    C. Forward the message to your supervisor and ask for her opinion on how to handle the situation.

    D. Delete the email and pretend nothing happened.



    68. During a blackbox pen test you attempt to pass IRC traffic over port 80/TCP from a compromised web enabled host. The traffic gets blocked; however, outbound HTTP traffic is unimpeded. What type of firewall is inspecting outbound traffic?

    A.Stateful

    B. Packet Filtering

    C. Application

    D. Circuit



    < Prev.Page             CEHv9 Home             Next page>