Spring Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

CertiProf CEHPC Ethical Hacking Professional Certification Exam Exam Practice Test

Page: 1 / 11
Total 112 questions

Ethical Hacking Professional Certification Exam Questions and Answers

Question 1

What is a "backdoor" in terms of computer security?

Options:

A.

A type of malware that spreads through instant messaging. B. A main door to access a system. C. A hidden access to a system that allows bypassing normal authentication.

Question 2

What operating system is Kali Linux based on?

Options:

A.

Ubuntu

B.

Arch Linux

C.

Debian

Question 3

What is a public IP address?

Options:

A.

An IP address that everyone uses.

B.

An IP address assigned by an Internet Service Provider (ISP) that is accessible over the internet.

C.

An IP address assigned by a modem to devices within a local network.

Question 4

Which command is used to update Kali Linux from the console?

Options:

A.

sudo update upgrade

B.

sudo apt-get update••

C.

sudo apt-get update

Question 5

Are brute force attacks extremely fast and effective?

Options:

A.

NO, this type of attack take a long time and there is a probability that it will not work.

B.

YES, since the dictionaries on the Internet are very complete.

C.

YES, no matter what specifications your computer has.

Question 6

What is masquerading?

Options:

A.

A method for masking network traffic only.

B.

A web authentication method.

C.

Impersonating the identity of a legitimate user or system to gain unauthorized access.

Question 7

Can an FTP protocol be breached?

Options:

A.

NO, it is very safe.

B.

YES, with the appropriate techniques.

C.

YES, asking the administrator for the user and password.

Question 8

What is an "exploit" in the hacking world?

Options:

A.

A malicious program that spreads through social networks.

B.

A code designed to exploit a specific vulnerability in a system.

C.

A technique for removing malware.

Question 9

Can all computers be hacked?

Options:

A.

No, only computers that are not updated with security patches and have exposed ports can be hacked.

B.

Yes, all computer equipment can be hacked without any complications.

C.

Yes, all computers are hackable.

Question 10

Which of the following is an example of social engineering?

Options:

A.

Use of antivirus software. B. Periodic updating of the operating system. C. Ask users to disclose their password over the phone.

Question 11

If a web page has HTTPS, does it mean that it is legitimate?

Options:

A.

No, since HTTPS only indicates that the connection is encrypted.

B.

Yes, since it shows the padlock.

C.

Yes, the HTTPS connection always appears on 100% secure sites.

Question 12

What is a White Hat hacker?

Options:

A.

A cybersecurity professional who uses their skills to legally identify and fix vulnerabilities in systems, networks, or applications to improve security.

B.

A person who creates exploits solely to expose vulnerable systems without authorization.

C.

A hacker who exploits vulnerabilities to steal or sell sensitive information for personal profit.

Question 13

Who uses Metasploit?

Options:

A.

Agricultural engineers.

B.

Food engineers.

C.

Cybersecurity experts.

Question 14

What is a public IP?

Options:

A.

Public IP addresses are assigned by Internet service providers.

B.

It is the IP address assigned by the modem to the devices.

C.

It is an IP that everyone uses.

Question 15

Do all hackers always carry out criminal activities?

Options:

A.

Yes, all hackers commit crimes such as hacking banks or social media accounts.

B.

No, ethical hackers responsibly report discovered vulnerabilities to the appropriate organization for remediation.

C.

Yes, hackers always sell stolen information to the highest bidder.

Question 16

Can Nmap be used for vulnerability scanning?

Options:

A.

YES, nmap has this capability as well.

B.

NO, other software is used for that purpose.

C.

NO, nmap can only perform port scanning.

Question 17

Is it possible to clone a web page?

Options:

A.

No

B.

Yes

Question 18

Can MD5 be decrypted?

Options:

A.

No, it is a very secure protocol.

B.

Yes, MD5 hashes can be cracked using modern tools, online databases, or precomputed hash tables.

C.

No, it is a very secure encryption algorithm.

Question 19

What is an XSS?

Options:

A.

It is a type of cloned website with malicious intent.

B.

It is a security vulnerability that occurs in mobile applications stealing balance or contacts.

C.

It is a security vulnerability that occurs in web applications when data provided by users is not properly filtered and malicious scripts are executed in the web browser of other users.

Question 20

Options:

A.

sudo apt-get update.

B.

sudo update ++ upgrade.

C.

sudo apt-get update++.

Question 21

Options:

A.

Hannah Montana Linux.

B.

Windows XP.

C.

Parrot OS.

Question 22

What is a security breach?

Options:

A.

A cybersecurity incident that results in unauthorized access to personal or corporate data.

B.

The hacking of the entire internet.

C.

An internet shutdown or breakup.

Question 23

What is Whois?

Options:

A.

It is a public directory through which you can know "who is" the owner of a domain or IP address.

B.

It is a directory by which it is possible to know where exactly the owner of a domain or IP address lives.

C.

It is a physical directory where names and ip addresses can be consulted since the beginning of the Internet.

Question 24

What is risk assessment?

Options:

A.

It is the process to buy antivirus.

B.

Is the process of comparing the results of the risk analysis with the risk assessment criteria to determine whether the risk or its magnitude is acceptable or tolerable.

C.

It is the process of comparing the results of the analysis with other companies.

Question 25

What is a vulnerability scan?

Options:

A.

It is the process of identifying, quantifying and prioritizing vulnerabilities in computer systems.

B.

It is the process of mapping the network and nodes in a building for better distribution.

C.

It is the process of identifying and exploiting gaps no matter what.

Question 26

According to what we have seen in the course, is it possible to do phishing outside our network?

Options:

A.

NO, the learned method does not work with all devices. B. YES, the learned method works perfectly and it is proven that hackers can perform this process to their advantage. C. NO, the learned method only works in a local environment.

Question 27

What is malware?

Options:

A.

Refers to any software specifically designed to protect, safeguard and store data on a device, network or system.

B.

Refers to any software specifically designed to damage, infect, steal data or otherwise cause a nuisance to a device, network or computer system, without the owner's consent.

C.

It is an Antivirus for servers especially.

Question 28

What is a zero-day vulnerability?

Options:

A.

A security flaw that is publicly known.

B.

A vulnerability that has been exploited for more than a year.

C.

A vulnerability that does not have a patch available.

Question 29

Is it important to perform pentesting to companies?

Options:

A.

YES, in order to protect the information.

B.

NO, since hackers do not exist.

C.

YES, in order to sell the information.

Question 30

Do Google Dorks show hacked computers or systems?

Options:

A.

No, Google Dorks are used to search for specific information indexed by search engines.

B.

Yes, Google Dorks work as a backdoor to all web pages.

C.

Yes, Google Dorks hack pages automatically to access data.

Question 31

What is the results report document?

Options:

A.

A document that lists tasks left unfinished due to time constraints.

B.

A document that details findings, including identified vulnerabilities and exposed sensitive information.

C.

A document used only to sign the agreement with the client.

Question 32

What is the main purpose of a "SQL injection" attack?

Options:

A.

Accessing an organization's network.

B.

Intercepting web traffic.

C.

Exploiting a database by manipulating SQL commands.

Question 33

Can all computers be hacked?

Options:

A.

Yes, all computer equipment can be hacked without any complications. B. Yes, all are hackable. C. No, only those that are not updated by security patches, both operating system and programs and exposed ports.

Page: 1 / 11
Total 112 questions