Spring Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

CertiProf CEHPC Dumps

Page: 1 / 11
Total 112 questions

Ethical Hacking Professional Certification Exam Questions and Answers

Question 1

What is a reverse shell?

Options:

A.

It refers to when the terminal is run with root privileges.

B.

A common Linux command-line console.

C.

It refers to a process in which the victim’s machine initiates a connection back to the attacker’s machine to receive commands.

Question 2

Do hackers only use Linux?

Options:

A.

Yes, since Linux is the only platform that works correctly for these tasks.

B.

Linux and Windows only.

C.

No, hackers use all operating systems.

Question 3

Can all computers be hacked?

Options:

A.

Yes, all computer equipment can be hacked without any complications. B. Yes, all are hackable. C. No, only those that are not updated by security patches, both operating system and programs and exposed ports.

Question 4

What is Google Hacking?

Options:

A.

Refers to the use of advanced search techniques in the Google engine to find public information without vulnerabilities in websites and systems.

B.

It is a special browser for ethical hackers seeking to protect systems.

C.

It refers to the use of certain advanced search techniques in Google's search engine to find sensitive information or vulnerabilities in websites and systems.

Question 5

What is a public IP address?

Options:

A.

An IP address that everyone uses.

B.

An IP address assigned by an Internet Service Provider (ISP) that is accessible over the internet.

C.

An IP address assigned by a modem to devices within a local network.

Question 6

When critical vulnerabilities are detected, what should be done?

Options:

A.

Document the problem and do nothing.

B.

Exploit it and extract as much information as possible.

C.

Inform the corresponding area for a prompt solution.

Question 7

What is a "backdoor" in terms of computer security?

Options:

A.

A type of malware that spreads through instant messaging. B. A main door to access a system. C. A hidden access to a system that allows bypassing normal authentication.

Question 8

Is it illegal to practice with VulnHub machines?

Options:

A.

Yes, because you are hacking into a system without authorization.

B.

No, because these machines are intentionally vulnerable and used in a local, isolated environment for learning and practice.

C.

No, because these machines do not contain vulnerabilities and are only meant to be observed.

Question 9

What is netcat?

Options:

A.

It is a versatile, open-source network tool used for reading and writing data over network connections.

B.

It is a hacking tool for Linux.

C.

It is a hacking tool for Windows.

Question 10

What is the results report document?

Options:

A.

A document that lists tasks left unfinished due to time constraints.

B.

A document that details findings, including identified vulnerabilities and exposed sensitive information.

C.

A document used only to sign the agreement with the client.

Question 11

What is masquerading?

Options:

A.

A method for masking network traffic only.

B.

A web authentication method.

C.

Impersonating the identity of a legitimate user or system to gain unauthorized access.

Question 12

Which of the following was a famous hacktivist group?

Options:

A.

Anonymous

B.

Fan7a5ma

C.

Hackers

Question 13

What is a security breach?

Options:

A.

It is the hacking of the entire Internet.

B.

It's an Internet breakup.

C.

It consists of a cyber security incident that affects personal or corporate data in different ways.

Question 14

Can the ssh protocol be breached?

Options:

A.

YES, as long as it is not correctly configured.

B.

NO, it is a 100% secure protocol.

C.

NO, it is impossible, there is no way to do it.

Question 15

Which of the following is an example of social engineering?

Options:

A.

Use of antivirus software. B. Periodic updating of the operating system. C. Ask users to disclose their password over the phone.

Question 16

How do you look for an exploit in metasploit?

Options:

A.

Use.

B.

Cannot be searched.

C.

Search.

Question 17

What operating system is Kali Linux based on?

Options:

A.

Ubuntu

B.

Arch Linux

C.

Debian

Question 18

Can the FTP protocol be breached?

Options:

A.

Yes, by asking the administrator for credentials.

B.

Yes, using appropriate attack techniques.

C.

No, FTP is very secure.

Question 19

Besides Kali Linux, what other operating system is used for hacking?

Options:

A.

Hannah Montana Linux.

B.

Windows xp

C.

Parrot OS.

Question 20

What is a flag inside intentionally vulnerable machines?

Options:

A.

A list of commands used as a guide to hack the machine.

B.

A file inside the machine containing a keyword or string that proves the system was successfully compromised.

C.

A symbolic pirate flag representing hackers.

Question 21

What is ethical responsibility in hacking?

Options:

A.

Performing scanning activities with technical knowledge only.

B.

Ensuring that scanning and testing are performed with proper authorization and for legitimate purposes.

C.

Ensuring that scanning is performed without permission and for illegitimate purposes.

Question 22

What is a private IP?

Options:

A.

It is the IP address assigned by the service provider.

B.

It is an IP that no one can use.

C.

Private IP addresses are used to enable communication between devices within a local network.

Question 23

What is Rhost in metasploit?

Options:

A.

Remote host.

B.

Local root variable.

C.

Root host.

Question 24

According to what was covered in the course, is it possible to perform phishing outside our network?

Options:

A.

Yes, the learned method works outside the local network and has been proven to be used by attackers to their advantage.

B.

No, the learned method only works in a local environment.

C.

No, the learned method does not work on all devices.

Question 25

What is a hacktivist?

Options:

A.

Refers to politicians who get involved in social issues by being in the news. B. They use their computer skills to steal sensitive information, to infect computer systems, to restrict access to a system. C. Refers to hacking into a computer system for political or social purposes. A hacktivist breaks into a computer system, but always with the aim of influencing ideological, religious, political or social causes.

Question 26

What is active recognition?

Options:

A.

We only see the target without performing actions.

B.

Gathers information by interacting with the target.

C.

Recognizes the target but does nothing.

Question 27

What is a public IP?

Options:

A.

Public IP addresses are assigned by Internet service providers.

B.

It is the IP address assigned by the modem to the devices.

C.

It is an IP that everyone uses.

Question 28

What is an Acceptable Use Policy?

Options:

A.

An acceptable use policy (AUP) is a type of security policy directed at all employees with access to one or more organizational assets.

B.

A NON-Acceptable Use Policy (AUP) is a type of security policy directed at all employees with access to one or more of the organization's assets.

C.

Are the terms and conditions in the software.

Question 29

Do hackers only perform criminal acts?

Options:

A.

Hackers do not exist. B. YES, they are only dedicated to exploiting vulnerabilities. C. NO, there are ethical hackers who are in charge of analyzing and reporting vulnerabilities.

Question 30

Options:

A.

Hannah Montana Linux.

B.

Windows XP.

C.

Parrot OS.

Question 31

What is an Acceptable Use Policy?

Options:

A.

An acceptable use policy (AUP) is a type of security policy directed at all employees with access to one or more organizational assets.

B.

A NON-Acceptable Use Policy (AUP) is a type of security policy directed at all employees with access to one or more organizational assets.

C.

Are the terms and conditions in the software.

Question 32

What is a SQL Injection?

Options:

A.

It is a SQL code execution that only the administrator can perform.

B.

It is a database used by hackers.

C.

Manipulation of SQL queries to access, modify or delete data in a database.

Question 33

What is a White Hat hacker?

Options:

A.

A cybersecurity professional who uses their skills to legally identify and fix vulnerabilities in systems, networks, or applications to improve security.

B.

A person who creates exploits solely to expose vulnerable systems without authorization.

C.

A hacker who exploits vulnerabilities to steal or sell sensitive information for personal profit.

Page: 1 / 11
Total 112 questions