Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium CertiProf CEHPC Dumps Questions Answers

Page: 1 / 8
Total 112 questions

Ethical Hacking Professional Certification Exam Questions and Answers

Question 1

What is ethical responsibility in hacking?

Options:

A.

Performing scanning activities with technical knowledge only.

B.

Ensuring that scanning and testing are performed with proper authorization and for legitimate purposes.

C.

Ensuring that scanning is performed without permission and for illegitimate purposes.

Buy Now
Question 2

How does Social Engineering work?

Options:

A.

They pretend to be friendly, trustworthy or authoritative people and get people to trust them. Once the person trusts the advisor, they may be helpful in protecting private information.

B.

They pretend to be friendly, trustworthy or authoritative people and trick victims into trusting them. Once the victim trusts the attacker, they can be manipulated into revealing private information.

C.

They pretend to be friendly, trustworthy people and protect the victims so that they trust them. Once the victim trusts the attacker, they can be manipulated to protect private information from being breached.

Question 3

What is a firewall?

Options:

A.

Software that protects against viruses.

B.

A method for hacking systems remotely.

C.

A device that monitors network traffic and helps prevent unauthorized access.

Question 4

What is a hacktivist?

Options:

A.

Refers to politicians who get involved in social issues by being in the news. B. They use their computer skills to steal sensitive information, to infect computer systems, to restrict access to a system. C. Refers to hacking into a computer system for political or social purposes. A hacktivist breaks into a computer system, but always with the aim of influencing ideological, religious, political or social causes.

Question 5

What is ZAP?

Options:

A.

ZAP is a closed source penetration testing tool used to evaluate online servers.

B.

It is a term used to describe the collection and analysis of information from publicly available sources, such as websites, social networks, government databases, news articles, among other resources freely available on the web.

C.

It is an open-source penetration testing tool used to evaluate the security of web applications.

Question 6

What is the most vulnerable within an organization?

Options:

A.

Servers.

B.

Wi-Fi network.

C.

Individuals.

Question 7

Do hackers only use Linux?

Options:

A.

Yes, since Linux is the only platform that works correctly for these tasks.

B.

Linux and Windows only.

C.

No, hackers use all operating systems.

Question 8

What is a vulnerability scan?

Options:

A.

It is the process of identifying, quantifying and prioritizing vulnerabilities in computer systems.

B.

It is the process of mapping the network and nodes in a building for better distribution.

C.

It is the process of identifying and exploiting gaps no matter what.

Question 9

What is masquerading?

Options:

A.

A method for masking network traffic only.

B.

A web authentication method.

C.

Impersonating the identity of a legitimate user or system to gain unauthorized access.

Question 10

According to what was covered in the course, is it possible to perform phishing outside our network?

Options:

A.

Yes, the learned method works outside the local network and has been proven to be used by attackers to their advantage.

B.

No, the learned method only works in a local environment.

C.

No, the learned method does not work on all devices.

Question 11

What is Phishing?

Options:

A.

It is a type of cyber-attack in which attackers try to trick people to obtain confidential information, such as usernames.

B.

It is the method to brute force passwords in web pages.

C.

It is a technique used to capture network traffic in order to obtain passwords in plain text.

Question 12

Do hackers only perform criminal acts?

Options:

A.

Hackers do not exist. B. YES, they are only dedicated to exploiting vulnerabilities. C. NO, there are ethical hackers who are in charge of analyzing and reporting vulnerabilities.

Question 13

What is Google Hacking?

Options:

A.

Refers to the use of advanced search techniques in the Google engine to find public information without vulnerabilities in websites and systems.

B.

It is a special browser for ethical hackers seeking to protect systems.

C.

It refers to the use of certain advanced search techniques in Google's search engine to find sensitive information or vulnerabilities in websites and systems.

Question 14

According to what we have seen in the course, is it possible to do phishing outside our network?

Options:

A.

NO, the learned method does not work with all devices. B. YES, the learned method works perfectly and it is proven that hackers can perform this process to their advantage. C. NO, the learned method only works in a local environment.

Question 15

What is an "exploit" in the hacking world?

Options:

A.

A malicious program that spreads through social networks.

B.

A code designed to exploit a specific vulnerability in a system.

C.

A technique for removing malware.

Question 16

As pentester can we exploit any vulnerability regardless of the affectations?

Options:

A.

YES, we have all the freedom.

B.

NO, since performing these acts without consent is a crime.

C.

YES, we have all the power to perform these processes without consent.

Question 17

What is a public IP?

Options:

A.

Public IP addresses are assigned by Internet service providers.

B.

It is the IP address assigned by the modem to the devices.

C.

It is an IP that everyone uses.

Question 18

Do Google Dorks show hacked computers or systems?

Options:

A.

No, Google Dorks are used to search for specific information indexed by search engines.

B.

Yes, Google Dorks work as a backdoor to all web pages.

C.

Yes, Google Dorks hack pages automatically to access data.

Question 19

What is the best practice to protect against malware?

Options:

A.

Install and keep antivirus software up to date.

B.

Sharing login information on suspicious websites.

C.

Click on suspicious links to verify their authenticity.

Question 20

Do all hackers always carry out criminal activities?

Options:

A.

Yes, all hackers commit crimes such as hacking banks or social media accounts.

B.

No, ethical hackers responsibly report discovered vulnerabilities to the appropriate organization for remediation.

C.

Yes, hackers always sell stolen information to the highest bidder.

Question 21

Options:

A.

Hannah Montana Linux.

B.

Windows XP.

C.

Parrot OS.

Question 22

Is it possible to perform geolocation phishing?

Options:

A.

Yes, but with paid tools.

B.

YES, it can be done with a seeker.

C.

NO, it is a very complicated technique.

Question 23

Can the ssh protocol be breached?

Options:

A.

YES, as long as it is not correctly configured.

B.

NO, it is a 100% secure protocol.

C.

NO, it is impossible, there is no way to do it.

Question 24

What is a security breach?

Options:

A.

It is the hacking of the entire Internet.

B.

It's an Internet breakup.

C.

It consists of a cyber security incident that affects personal or corporate data in different ways.

Question 25

What is SQL Injection?

Options:

A.

The manipulation of SQL queries to access, modify, or delete data within a database without authorization.

B.

A database system used by hackers.

C.

SQL code execution that only administrators can perform.

Question 26

Can the FTP protocol be breached?

Options:

A.

Yes, by asking the administrator for credentials.

B.

Yes, using appropriate attack techniques.

C.

No, FTP is very secure.

Question 27

What is a dictionary used for brute-force attacks?

Options:

A.

A common dictionary that contains words and their meanings.

B.

A plain text document where passwords are usually stored.

C.

A document containing a list of possible passwords that may successfully authenticate into a system.

Question 28

What is active reconnaissance?

Options:

A.

Recognizes the target but does nothing.

B.

Observes the target without performing any direct actions.

C.

Gathers information by directly interacting with the target.

Question 29

What is ransomware?

Options:

A.

A type of malicious software that encrypts files and demands a ransom for their release.

B.

A security protocol to protect confidential data.

C.

A cloud backup service.

Question 30

What is the most vulnerable within an organization?

Options:

A.

Servers

B.

Wi-Fi network

C.

Individuals

Question 31

Options:

A.

A file inside the machine with a key word or letters to check that it was successfully breached. B. A common flag with a pirate skull in meaning of hackers. C. A list of commands used as a guide to hack the machine.

Question 32

What is an Acceptable Use Policy?

Options:

A.

An acceptable use policy (AUP) is a type of security policy directed at all employees with access to one or more organizational assets.

B.

A NON-Acceptable Use Policy (AUP) is a type of security policy directed at all employees with access to one or more organizational assets.

C.

Are the terms and conditions in the software.

Question 33

Are brute force attacks extremely fast and effective?

Options:

A.

NO, this type of attack take a long time and there is a probability that it will not work.

B.

YES, since the dictionaries on the Internet are very complete.

C.

YES, no matter what specifications your computer has.

Page: 1 / 8
Total 112 questions