Spring Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

CEHPC Ethical Hacking Professional Certification Exam Questions and Answers

Questions 4

What is a Firewall?

Options:

A.

It is a firewall that serves to protect the server.

B.

It is a computer security measure designed to protect a network, computer system or device against external or internal threats by monitoring, controlling and filtering network traffic according to a set of predefined rules.

C.

It is a protection system designed so that hackers cannot be discovered.

Buy Now
Questions 5

What is malware?

Options:

A.

Refers to any software specifically designed to protect, safeguard and store data on a device, network or system.

B.

Refers to any software specifically designed to damage, infect, steal data or otherwise cause a nuisance to a device, network or system without the owner's consent.

C.

It is an Antivirus for servers especially.

Buy Now
Questions 6

Can Kali Linux only be used by criminals?

Options:

A.

YES, criminal acts are carried out with it.

B.

YES, it is a prohibited system.

C.

NO, it can be used by cybersecurity enthusiasts.

Buy Now
Questions 7

What is masquerading?

Options:

A.

A method for masking network traffic only.

B.

A web authentication method.

C.

Impersonating the identity of a legitimate user or system to gain unauthorized access.

Buy Now
Questions 8

What is an XSS?

Options:

A.

It is a type of cloned website with malicious intent.

B.

It is a security vulnerability that occurs in mobile applications stealing balance or contacts.

C.

It is a security vulnerability that occurs in web applications when data provided by users is not properly filtered and malicious scripts are executed in the web browser of other users.

Buy Now
Questions 9

How does Social Engineering work?

Options:

A.

They pretend to be friendly, trustworthy or authoritative people and get people to trust them. Once the person trusts the advisor, they may be helpful in protecting private information. B. They pretend to be friendly, trustworthy or authoritative people and trick victims into trusting them. Once the victim trusts the attacker they can be manipulated into revealing private information. C. They pretend to be friendly, trustworthy people and p

Buy Now
Questions 10

What is Nessus used for?

Options:

A.

To watch videos on a blocked network.

B.

To scan a network or system for vulnerabilities.

C.

For automated hacking.

Buy Now
Questions 11

Do Google dorks show hacked computers?

Options:

A.

YES, Google dorks hacks pages for us in order to access data. B. NO, Google dorks works to search for specific topics. C. YES, Google dorks works as a backdoor to all web pages.

Buy Now
Questions 12

What is XSS (Cross-Site Scripting)?

Options:

A.

It is a security vulnerability that occurs in web applications when user-supplied input is not properly validated or sanitized, allowing malicious scripts to execute in a user’s web browser.

B.

It is a type of cloned website created with malicious intent.

C.

It is a security vulnerability that occurs in mobile applications to steal balances or contacts.

Buy Now
Questions 13

What is the results report document?

Options:

A.

A document that lists tasks left unfinished due to time constraints.

B.

A document that details findings, including identified vulnerabilities and exposed sensitive information.

C.

A document used only to sign the agreement with the client.

Buy Now
Questions 14

What is Rhost in metasploit?

Options:

A.

Remote host.

B.

Local root variable.

C.

Root host.

Buy Now
Questions 15

What tool would you use to search for hidden directories or files?

Options:

A.

Dirb

B.

Shodan

C.

Ping

Buy Now
Questions 16

Do Google Dorks show hacked computers or systems?

Options:

A.

No, Google Dorks are used to search for specific information indexed by search engines.

B.

Yes, Google Dorks work as a backdoor to all web pages.

C.

Yes, Google Dorks hack pages automatically to access data.

Buy Now
Questions 17

Can MD5 be decrypted?

Options:

A.

No, it is a very secure protocol.

B.

Yes, MD5 hashes can be cracked using modern tools, online databases, or precomputed hash tables.

C.

No, it is a very secure encryption algorithm.

Buy Now
Questions 18

What is a private IP?

Options:

A.

It is the IP address assigned by the service provider.

B.

It is an IP that no one can use.

C.

Private IP addresses are used to enable communication between devices within a local network.

Buy Now
Questions 19

According to the course, which program do we use to make osint to email accounts?

Options:

A.

Sherlock.

B.

Seeker.

C.

Shodan.

Buy Now
Questions 20

What is a CVE?

Options:

A.

Common Non-Vulnerable Entries that list secure systems.

B.

A hacker magazine available for purchase.

C.

Common Vulnerabilities and Exposures (CVE) is a publicly available list of known computer security vulnerabilities.

Buy Now
Questions 21

Options:

A.

It refers to a process in which the victim's machine connects to the attacker's machine to receive commands.

B.

It refers to when the terminal is run with root.

C.

A common Linux command console.

Buy Now
Questions 22

What is Netcat?

Options:

A.

It is a hacking tool designed only for Windows systems.

B.

It is a versatile, open-source networking tool used for reading and writing data over network connections.

C.

It is a hacking tool designed only for Linux systems.

Buy Now
Questions 23

What is an "exploit" in the hacking world?

Options:

A.

A malicious program that spreads through social networks.

B.

A code designed to exploit a specific vulnerability in a system.

C.

A technique for removing malware.

Buy Now
Questions 24

Which command is used to update Kali Linux from the console?

Options:

A.

sudo update upgrade

B.

sudo apt-get update••

C.

sudo apt-get update

Buy Now
Questions 25

What is a firewall?

Options:

A.

A device or software that monitors and filters network traffic to help prevent unauthorized access.

B.

Software that only protects against viruses.

C.

A method for hacking systems remotely.

Buy Now
Questions 26

Can all computers be hacked?

Options:

A.

No, only computers that are not updated with security patches and have exposed ports can be hacked.

B.

Yes, all computer equipment can be hacked without any complications.

C.

Yes, all computers are hackable.

Buy Now
Questions 27

What is risk assessment?

Options:

A.

It is the process to buy antivirus.

B.

Is the process of comparing the results of the risk analysis with the risk assessment criteria to determine whether the risk or its magnitude is acceptable or tolerable.

C.

It is the process of comparing the results of the analysis with other companies.

Buy Now
Questions 28

Options:

A.

Hannah Montana Linux.

B.

Windows XP.

C.

Parrot OS.

Buy Now
Questions 29

What is a hacktivist?

Options:

A.

Refers to politicians who get involved in social issues by being in the news. B. They use their computer skills to steal sensitive information, to infect computer systems, to restrict access to a system. C. Refers to hacking into a computer system for political or social purposes. A hacktivist breaks into a computer system, but always with the aim of influencing ideological, religious, political or social causes.

Buy Now
Questions 30

What is a dictionary used for brute-force attacks?

Options:

A.

A common dictionary that contains words and their meanings.

B.

A plain text document where passwords are usually stored.

C.

A document containing a list of possible passwords that may successfully authenticate into a system.

Buy Now
Questions 31

What is a zero-day vulnerability?

Options:

A.

A security flaw that is publicly known.

B.

A vulnerability that has been exploited for more than a year.

C.

A vulnerability that does not have a patch available.

Buy Now
Questions 32

What is a security breach?

Options:

A.

It is the hacking of the entire Internet.

B.

It's an Internet breakup.

C.

It consists of a cyber security incident that affects personal or corporate data in different ways.

Buy Now
Questions 33

Which of the following is a network security protocol designed to authenticate and authorize remote users to securely access network resources?

Options:

A.

SSH (Secure Shell)

B.

FTP (File Transfer Protocol)

C.

SSL (Secure Sockets Layer)

Buy Now
Exam Code: CEHPC
Exam Name: Ethical Hacking Professional Certification Exam
Last Update: Mar 22, 2026
Questions: 112
CEHPC pdf

CEHPC PDF

$25.5  $84.99
CEHPC Engine

CEHPC Testing Engine

$30  $99.99
CEHPC PDF + Engine

CEHPC PDF + Testing Engine

$40.5  $134.99