tutorialpoint.org

Engg. tutorials

  • Instrumentation and Control Lab
  • Control systems assignment
  • Shape memory alloy SMA actuator
  • Dielectric elastomer
  • EM theory lecture notes
  • GATE question papers
  • JAM question papers
  • Kalman filter tutorial
  • Nonlinear estimation
  • Certified Ethical Hacker (CEHv9) Questions and answers

    83. You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist's email, and you send her an email changing the source email to her boss's email(boss@company ). In this email, you ask for a pdf with information. She reads your email and sends back a pdf with finks. You exchange the pdf links with your malicious links (these links contain malware) and send back the modified pdf, saying that the links don't work. She reads your email, opens the links, and her machine gets infected. You now have access to the company network. What testing method did you use?

    A. Eavesdropping

    B. Social engineering

    C. Tailgating

    D. Piggybacking



    84. Which of the following is designed to indentify malicious attempts to penetrate systems

    A. Proxy

    B. Router

    C. Intrusion Detection System

    D. Firewall



    < Prev.Page             CEHv9 Home             Next page>