Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

CertiProf CEHPC Ethical Hacking Professional Certification Exam Exam Practice Test

Demo: 33 questions
Total 112 questions

Ethical Hacking Professional Certification Exam Questions and Answers

Question 1

What operating system is Kali Linux based on?

Options:

A.

Ubuntu

B.

Arch Linux

C.

Debian

Question 2

What is an Acceptable Use Policy?

Options:

A.

An acceptable use policy (AUP) is a type of security policy directed at all employees with access to one or more organizational assets.

B.

A NON-Acceptable Use Policy (AUP) is a type of security policy directed at all employees with access to one or more organizational assets.

C.

Are the terms and conditions in the software.

Question 3

What is Rhost in metasploit?

Options:

A.

Remote host.

B.

Local root variable.

C.

Root host.

Question 4

Which command is used to update Kali Linux from the console?

Options:

A.

sudo update upgrade

B.

sudo apt-get update••

C.

sudo apt-get update

Question 5

Is it illegal to practice with VulnHub machines?

Options:

A.

Yes, because you are hacking into a system without authorization.

B.

No, because these machines are intentionally vulnerable and used in a local, isolated environment for learning and practice.

C.

No, because these machines do not contain vulnerabilities and are only meant to be observed.

Question 6

Options:

A.

It refers to a process in which the victim's machine connects to the attacker's machine to receive commands.

B.

It refers to when the terminal is run with root.

C.

A common Linux command console.

Question 7

According to what we have seen in the course, is it possible to do phishing outside our network?

Options:

A.

NO, the learned method does not work with all devices. B. YES, the learned method works perfectly and it is proven that hackers can perform this process to their advantage. C. NO, the learned method only works in a local environment.

Question 8

What is the results report document?

Options:

A.

A document that lists tasks left unfinished due to time constraints.

B.

A document that details findings, including identified vulnerabilities and exposed sensitive information.

C.

A document used only to sign the agreement with the client.

Question 9

What is a black hat hacker?

Options:

A.

They use their computer skills to steal confidential information, to infect computer systems, to restrict access to a system.

B.

They use their computer skills to protect confidential information to restrict access to a system.

C.

They check the wiring of installations, provide support to users and are aware of servers in small companies.

Question 10

Is it important to perform penetration testing for companies?

Options:

A.

Yes, in order to sell the information.

B.

Yes, in order to protect information and systems.

C.

No, because hackers do not exist.

Question 11

What is privilege escalation?

Options:

A.

A term used in computer security to describe a situation where a user or process gains higher permissions than originally assigned.

B.

A term used when a user formally requests elevated permissions from a system administrator.

C.

A term used by hackers to describe asking compromised administrators for new permissions.

Question 12

What is a public IP address?

Options:

A.

An IP address that everyone uses.

B.

An IP address assigned by an Internet Service Provider (ISP) that is accessible over the internet.

C.

An IP address assigned by a modem to devices within a local network.

Question 13

According to what was covered in the course, is it possible to perform phishing outside our network?

Options:

A.

Yes, the learned method works outside the local network and has been proven to be used by attackers to their advantage.

B.

No, the learned method only works in a local environment.

C.

No, the learned method does not work on all devices.

Question 14

What is a flag inside intentionally vulnerable machines?

Options:

A.

A list of commands used as a guide to hack the machine.

B.

A file inside the machine containing a keyword or string that proves the system was successfully compromised.

C.

A symbolic pirate flag representing hackers.

Question 15

Can MD5 be decrypted?

Options:

A.

No, it is a very secure protocol.

B.

Yes, MD5 hashes can be cracked using modern tools, online databases, or precomputed hash tables.

C.

No, it is a very secure encryption algorithm.

Question 16

What is a dictionary used for brute-force attacks?

Options:

A.

A common dictionary that contains words and their meanings.

B.

A plain text document where passwords are usually stored.

C.

A document containing a list of possible passwords that may successfully authenticate into a system.

Question 17

What is Shodan?

Options:

A.

A fast-food delivery application.

B.

A web browser that competes with Chrome and Bing.

C.

A specialized search engine that scans and collects information about devices connected to the internet.

Question 18

Do hackers only use Linux?

Options:

A.

Yes, since Linux is the only platform that works correctly for these tasks.

B.

Linux and Windows only.

C.

No, hackers use all operating systems.

Question 19

Can all computers be hacked?

Options:

A.

Yes, all computer equipment can be hacked without any complications. B. Yes, all are hackable. C. No, only those that are not updated by security patches, both operating system and programs and exposed ports.

Question 20

What is active reconnaissance?

Options:

A.

Recognizes the target but does nothing.

B.

Observes the target without performing any direct actions.

C.

Gathers information by directly interacting with the target.

Question 21

What is a backdoor in terms of computer security?

Options:

A.

A hidden access mechanism in a system that allows bypassing normal authentication or security controls.

B.

A type of malware that spreads through instant messaging applications.

C.

A main or official entry point used to access a system.

Question 22

What is Nmap?

Options:

A.

It is an open-source command-line tool used to scan IP addresses and ports on a network and to detect services, operating systems, and running applications.

B.

It is a Linux-based tool that works specifically to exploit computer vulnerabilities.

C.

It is a program used only for pinging computers within a network or work environment.

Question 23

What tool would you use to search for hidden directories or files?

Options:

A.

Dirb

B.

Shodan

C.

Ping

Question 24

What is the best practice to protect against malware?

Options:

A.

Sharing login information on suspicious websites.

B.

Clicking on suspicious links to verify their authenticity.

C.

Installing and keeping antivirus software up to date.

Question 25

What is a private IP?

Options:

A.

It is the IP address assigned by the service provider.

B.

It is an IP that no one can use.

C.

Private IP addresses are used to enable communication between devices within a local network.

Question 26

Which of the following is an example of social engineering?

Options:

A.

Use of antivirus software. B. Periodic updating of the operating system. C. Ask users to disclose their password over the phone.

Question 27

Do Google Dorks show hacked computers or systems?

Options:

A.

No, Google Dorks are used to search for specific information indexed by search engines.

B.

Yes, Google Dorks work as a backdoor to all web pages.

C.

Yes, Google Dorks hack pages automatically to access data.

Question 28

What is ZAP?

Options:

A.

ZAP is a closed source penetration testing tool used to evaluate online servers.

B.

It is a term used to describe the collection and analysis of information from publicly available sources, such as websites, social networks, government databases, news articles, among other resources freely available on the web.

C.

It is an open-source penetration testing tool used to evaluate the security of web applications.

Question 29

What is a Whitehack?

Options:

A.

A person who creates exploits with the sole purpose of exposing existing vulnerable systems.

B.

It is a type of hacker who exploits vulnerabilities in search of information that can compromise a company and sell this information in order to make a profit regardless of the damage it may cause to the organization.

C.

Refers to a computer security professional or expert who uses their skills and knowledge to identify and fix vulnerabilities in systems, networks or applications for the purpose of improving security and protecting against potential cyber threats.

Question 30

Is it possible to perform geolocation phishing?

Options:

A.

Yes, but with paid tools.

B.

YES, it can be done with a seeker.

C.

NO, it is a very complicated technique.

Question 31

What is SQL Injection?

Options:

A.

The manipulation of SQL queries to access, modify, or delete data within a database without authorization.

B.

A database system used by hackers.

C.

SQL code execution that only administrators can perform.

Question 32

Is it possible to clone a web page?

Options:

A.

No

B.

Yes

Question 33

Options:

A.

A person who creates exploits with the sole purpose of exposing existing vulnerable systems.

B.

It is a type of hacker who exploits vulnerabilities in search of information that can compromise a company and sell this information in order to make a profit regardless of the damage it may cause to the organization.

C.

Refers to a computer security professional or expert who uses their skills and knowledge to identify and fix vulnerabilities in systems, networks or applications for the purpose of improving security and protecting against potential cyber threats.

Demo: 33 questions
Total 112 questions