Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CertiProf > Ethical Hacking Professional > CEHPC

CEHPC Ethical Hacking Professional Certification Exam Question and Answers

Question # 4

What is XSS (Cross-Site Scripting)?

A.

It is a security vulnerability that occurs in web applications when user-supplied input is not properly validated or sanitized, allowing malicious scripts to execute in a user’s web browser.

B.

It is a type of cloned website created with malicious intent.

C.

It is a security vulnerability that occurs in mobile applications to steal balances or contacts.

Full Access
Question # 5

What is risk assessment?

A.

It is the process to buy antivirus.

B.

Is the process of comparing the results of the risk analysis with the risk assessment criteria to determine whether the risk or its magnitude is acceptable or tolerable.

C.

It is the process of comparing the results of the analysis with other companies.

Full Access
Question # 6

According to the course, which program do we use to make osint to email accounts?

A.

Sherlock.

B.

Seeker.

C.

Shodan.

Full Access
Question # 7

What is the results report document?

A.

A document that lists tasks left unfinished due to time constraints.

B.

A document that details findings, including identified vulnerabilities and exposed sensitive information.

C.

A document used only to sign the agreement with the client.

Full Access
Question # 8

Are brute force attacks extremely fast and effective?

A.

NO, this type of attack take a long time and there is a probability that it will not work.

B.

YES, since the dictionaries on the Internet are very complete.

C.

YES, no matter what specifications your computer has.

Full Access
Question # 9

What tool would you use to scan ports?

A.

Metasploit

B.

Nmap

C.

Shodan

Full Access
Question # 10

What is a reverse shell?

A.

It refers to a process in which the victim's machine connects to the attacker's machine to receive commands.

B.

It refers to when the terminal is run with root.

C.

A common Linux command console.

Full Access
Question # 11

Can Nmap be used for vulnerability scanning?

A.

YES, nmap has this capability as well.

B.

NO, other software is used for that purpose.

C.

NO, nmap can only perform port scanning.

Full Access
Question # 12

Which of the following is an example of social engineering?

A.

Asking users to disclose their passwords over the phone.

B.

Using antivirus software.

C.

Periodically updating the operating system.

Full Access
Question # 13

Can Kali Linux only be used by criminals?

A.

YES, criminal acts are carried out with it.

B.

YES, it is a prohibited system.

C.

NO, it can be used by cybersecurity enthusiasts.

Full Access
Question # 14

Do Google Dorks show hacked computers or systems?

A.

No, Google Dorks are used to search for specific information indexed by search engines.

B.

Yes, Google Dorks work as a backdoor to all web pages.

C.

Yes, Google Dorks hack pages automatically to access data.

Full Access
Question # 15

Is it possible to clone a web page?

A.

No

B.

Yes

Full Access
Question # 16

What is an "exploit" in the hacking world?

A.

A malicious program that spreads through social networks.

B.

A code designed to exploit a specific vulnerability in a system.

C.

A technique for removing malware.

Full Access
Question # 17

What is a "backdoor" in terms of computer security?

A.

A type of malware that spreads through instant messaging. B. A main door to access a system. C. A hidden access to a system that allows bypassing normal authentication.

Full Access
Question # 18

What is a CVE?

A.

Common Non-Vulnerable Entries that list secure systems.

B.

A hacker magazine available for purchase.

C.

Common Vulnerabilities and Exposures (CVE) is a publicly available list of known computer security vulnerabilities.

Full Access
Question # 19

What is a public IP address?

A.

An IP address that everyone uses.

B.

An IP address assigned by an Internet Service Provider (ISP) that is accessible over the internet.

C.

An IP address assigned by a modem to devices within a local network.

Full Access
Question # 20

What is Nessus used for?

A.

To watch videos on a blocked network.

B.

To scan a network or system for vulnerabilities.

C.

For automated hacking.

Full Access
Question # 21

Do all hackers always carry out criminal activities?

A.

Yes, all hackers commit crimes such as hacking banks or social media accounts.

B.

No, ethical hackers responsibly report discovered vulnerabilities to the appropriate organization for remediation.

C.

Yes, hackers always sell stolen information to the highest bidder.

Full Access
Question # 22

Can ransomware attacks happen to anyone or only to large companies?

A.

We can all be infected by ransomware.

B.

Only large companies with very important data.

C.

Only computers with Windows 7 and XP.

Full Access
Question # 23

What is a SQL Injection?

A.

It is a SQL code execution that only the administrator can perform.

B.

It is a database used by hackers.

C.

Manipulation of SQL queries to access, modify or delete data in a database.

Full Access
Question # 24

What is Rhost in metasploit?

A.

Remote host.

B.

Local root variable.

C.

Root host.

Full Access
Question # 25

What is a flag inside intentionally vulnerable machines?

A.

A list of commands used as a guide to hack the machine.

B.

A file inside the machine containing a keyword or string that proves the system was successfully compromised.

C.

A symbolic pirate flag representing hackers.

Full Access
Question # 26

What is Phishing?

A.

It is a type of cyber-attack in which attackers try to trick people to obtain confidential information, such as usernames.

B.

It is the method to brute force passwords in web pages.

C.

It is a technique used to capture network traffic in order to obtain passwords in plain text.

Full Access
Question # 27

What tool would you use to search for hidden directories or files?

A.

Dirb

B.

Shodan

C.

Ping

Full Access
Question # 28

What is SQL Injection?

A.

The manipulation of SQL queries to access, modify, or delete data within a database without authorization.

B.

A database system used by hackers.

C.

SQL code execution that only administrators can perform.

Full Access
Question # 29

On which website can you check if your email account has been compromised?

A.

https://facebook.com

B.

https://haveibeenpwned.com

C.

https://rincondelvago.com

Full Access
Question # 30

Is it illegal to practice with VulnHub machines?

A.

Yes, because you are hacking into a system without authorization.

B.

No, because these machines are intentionally vulnerable and used in a local, isolated environment for learning and practice.

C.

No, because these machines do not contain vulnerabilities and are only meant to be observed.

Full Access
Question # 31

Which command is used to update Kali Linux from the console?

A.

sudo update upgrade

B.

sudo apt-get update••

C.

sudo apt-get update

Full Access
Question # 32

Can the ssh protocol be breached?

A.

YES, as long as it is not correctly configured.

B.

NO, it is a 100% secure protocol.

C.

NO, it is impossible, there is no way to do it.

Full Access
Question # 33

What is the best practice to protect against malware?

A.

Sharing login information on suspicious websites.

B.

Clicking on suspicious links to verify their authenticity.

C.

Installing and keeping antivirus software up to date.

Full Access