Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

CEHPC Ethical Hacking Professional Certification Exam Questions and Answers

Questions 4

Can the ssh protocol be breached?

Options:

A.

YES, as long as it is not correctly configured.

B.

NO, it is a 100% secure protocol.

C.

NO, it is impossible, there is no way to do it.

Buy Now
Questions 5

Which of the following is an example of social engineering?

Options:

A.

Use of antivirus software. B. Periodic updating of the operating system. C. Ask users to disclose their password over the phone.

Buy Now
Questions 6

What is malware?

Options:

A.

Refers to any software specifically designed to protect, safeguard and store data on a device, network or system.

B.

Refers to any software specifically designed to damage, infect, steal data or otherwise cause a nuisance to a device, network or system without the owner's consent.

C.

It is an Antivirus for servers especially.

Buy Now
Questions 7

What is XSS (Cross-Site Scripting)?

Options:

A.

It is a security vulnerability that occurs in web applications when user-supplied input is not properly validated or sanitized, allowing malicious scripts to execute in a user’s web browser.

B.

It is a type of cloned website created with malicious intent.

C.

It is a security vulnerability that occurs in mobile applications to steal balances or contacts.

Buy Now
Questions 8

What is netcat?

Options:

A.

It is a versatile, open-source network tool used for reading and writing data over network connections.

B.

It is a hacking tool for Linux.

C.

It is a hacking tool for Windows.

Buy Now
Questions 9

What is Nmap?

Options:

A.

It is an open-source command-line tool used to scan IP addresses and ports on a network and to detect services, operating systems, and running applications.

B.

It is a Linux-based tool that works specifically to exploit computer vulnerabilities.

C.

It is a program used only for pinging computers within a network or work environment.

Buy Now
Questions 10

Can MD5 be decrypted?

Options:

A.

No, it is a very secure protocol.

B.

Yes, MD5 hashes can be cracked using modern tools, online databases, or precomputed hash tables.

C.

No, it is a very secure encryption algorithm.

Buy Now
Questions 11

What is the best practice to protect against malware?

Options:

A.

Sharing login information on suspicious websites.

B.

Clicking on suspicious links to verify their authenticity.

C.

Installing and keeping antivirus software up to date.

Buy Now
Questions 12

What is a "backdoor" in terms of computer security?

Options:

A.

A type of malware that spreads through instant messaging. B. A main door to access a system. C. A hidden access to a system that allows bypassing normal authentication.

Buy Now
Questions 13

What is a dictionary used for brute-force attacks?

Options:

A.

A common dictionary that contains words and their meanings.

B.

A plain text document where passwords are usually stored.

C.

A document containing a list of possible passwords that may successfully authenticate into a system.

Buy Now
Questions 14

What is the main purpose of a "SQL injection" attack?

Options:

A.

Accessing an organization's network.

B.

Intercepting web traffic.

C.

Exploiting a database by manipulating SQL commands.

Buy Now
Questions 15

Do all hackers always carry out criminal activities?

Options:

A.

Yes, all hackers commit crimes such as hacking banks or social media accounts.

B.

No, ethical hackers responsibly report discovered vulnerabilities to the appropriate organization for remediation.

C.

Yes, hackers always sell stolen information to the highest bidder.

Buy Now
Questions 16

What is Netcat?

Options:

A.

It is a hacking tool designed only for Windows systems.

B.

It is a versatile, open-source networking tool used for reading and writing data over network connections.

C.

It is a hacking tool designed only for Linux systems.

Buy Now
Questions 17

How do you look for an exploit in metasploit?

Options:

A.

Use.

B.

Cannot be searched.

C.

Search.

Buy Now
Questions 18

What tool would you use to scan ports?

Options:

A.

Metasploit

B.

Nmap

C.

Shodan

Buy Now
Questions 19

Is pinging considered a crime if it is done without authorization?

Options:

A.

No, it is only used to validate if a service or host is active.

B.

No, ping does not work at all.

C.

Yes, privacy is being violated.

Buy Now
Questions 20

What is a firewall?

Options:

A.

A device or software that monitors and filters network traffic to help prevent unauthorized access.

B.

Software that only protects against viruses.

C.

A method for hacking systems remotely.

Buy Now
Questions 21

What is a reverse shell?

Options:

A.

It refers to a process in which the victim's machine connects to the attacker's machine to receive commands.

B.

It refers to when the terminal is run with root.

C.

A common Linux command console.

Buy Now
Questions 22

Is it possible to clone a web page?

Options:

A.

No

B.

Yes

Buy Now
Questions 23

What is a security breach?

Options:

A.

It is the hacking of the entire Internet.

B.

It's an Internet breakup.

C.

It consists of a cyber security incident that affects personal or corporate data in different ways.

Buy Now
Questions 24

What is active recognition?

Options:

A.

We only see the target without performing actions.

B.

Gathers information by interacting with the target.

C.

Recognizes the target but does nothing.

Buy Now
Questions 25

When critical vulnerabilities are detected, what should be done?

Options:

A.

Document the problem and do nothing.

B.

Exploit it and extract as much information as possible.

C.

Inform the corresponding area for a prompt solution.

Buy Now
Questions 26

Can Kali Linux only be used by criminals?

Options:

A.

YES, criminal acts are carried out with it.

B.

YES, it is a prohibited system.

C.

NO, it can be used by cybersecurity enthusiasts.

Buy Now
Questions 27

What is a public IP address?

Options:

A.

An IP address that everyone uses.

B.

An IP address assigned by an Internet Service Provider (ISP) that is accessible over the internet.

C.

An IP address assigned by a modem to devices within a local network.

Buy Now
Questions 28

What is the best practice to protect against malware?

Options:

A.

Install and keep antivirus software up to date.

B.

Sharing login information on suspicious websites.

C.

Click on suspicious links to verify their authenticity.

Buy Now
Questions 29

What is SQL Injection?

Options:

A.

The manipulation of SQL queries to access, modify, or delete data within a database without authorization.

B.

A database system used by hackers.

C.

SQL code execution that only administrators can perform.

Buy Now
Questions 30

What is Masquerading?

Options:

A.

Consists of impersonating the identity of a legitimate user of a computer system or its environment.

B.

A method for masking network traffic.

C.

Web authentication method.

Buy Now
Questions 31

What is ethical responsibility in hacking?

Options:

A.

Performing scanning activities with technical knowledge only.

B.

Ensuring that scanning and testing are performed with proper authorization and for legitimate purposes.

C.

Ensuring that scanning is performed without permission and for illegitimate purposes.

Buy Now
Questions 32

What is the results report document?

Options:

A.

A document that lists tasks left unfinished due to time constraints.

B.

A document that details findings, including identified vulnerabilities and exposed sensitive information.

C.

A document used only to sign the agreement with the client.

Buy Now
Questions 33

What is a SQL Injection?

Options:

A.

It is a SQL code execution that only the administrator can perform.

B.

It is a database used by hackers.

C.

Manipulation of SQL queries to access, modify or delete data in a database.

Buy Now
Exam Code: CEHPC
Exam Name: Ethical Hacking Professional Certification Exam
Last Update: Feb 21, 2026
Questions: 112
CEHPC pdf

CEHPC PDF

$25.5  $84.99
CEHPC Engine

CEHPC Testing Engine

$30  $99.99
CEHPC PDF + Engine

CEHPC PDF + Testing Engine

$40.5  $134.99