tutorialpoint.org

Engg. tutorials

  • Instrumentation and Control Lab
  • Control systems assignment
  • Shape memory alloy SMA actuator
  • Dielectric elastomer
  • EM theory lecture notes
  • GATE question papers
  • JAM question papers
  • Kalman filter tutorial
  • Nonlinear estimation
  • Certified Ethical Hacker (CEHv9) Questions and answers

    15. Your company performs penetration tests and security assessments for small and medium-sized business in the local area. During a routine security assessment, you discover information that suggests your client is involved with human trafficking. What should you do?

    A. Confront the client in a respectful manner and ask her about the data.

    B. Ignore the data and continue the assessment until completed as agreed.

    C. Copy the data to removable media and keep it in case you need it.

    D. Immediately stop work and contact the proper legal authorities.



    16.In Risk Management, how is the term "likelihood" related to the concept of "threat?"

    A. Likelihood is the likely source of a threat that could exploit a vulnerability.

    B. Likelihood is the probability that a threat-source will exploit a vulnerability.

    C. Likelihood is the probability that a vulnerability is a threat-source.

    D. Likelihood is a possible threat-source that may exploit a vulnerability.



    < Prev.Page             CEHv9 Home             Next page>