Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

CEHPC Ethical Hacking Professional Certification Exam Questions and Answers

Questions 4

Can all computers be hacked?

Options:

A.

Yes, all computer equipment can be hacked without any complications. B. Yes, all are hackable. C. No, only those that are not updated by security patches, both operating system and programs and exposed ports.

Buy Now
Questions 5

What is "root" in Linux?

Options:

A.

It is the most important file in Linux since it is the root of the system.

B.

Pre-installed user on Linux to log in.

C.

Is the name of the user who has the highest level of privileges within the system.

Buy Now
Questions 6

What is masquerading?

Options:

A.

A method for masking network traffic only.

B.

A web authentication method.

C.

Impersonating the identity of a legitimate user or system to gain unauthorized access.

Buy Now
Questions 7

What is a SQL Injection?

Options:

A.

It is a SQL code execution that only the administrator can perform.

B.

It is a database used by hackers.

C.

Manipulation of SQL queries to access, modify or delete data in a database.

Buy Now
Questions 8

What is Phishing?

Options:

A.

It is a type of cyber-attack in which attackers try to trick people to obtain confidential information, such as usernames.

B.

It is the method to brute force passwords in web pages.

C.

It is a technique used to capture network traffic in order to obtain passwords in plain text.

Buy Now
Questions 9

What is the most vulnerable within an organization?

Options:

A.

Servers.

B.

Wi-Fi network.

C.

Individuals.

Buy Now
Questions 10

Can the FTP protocol be breached?

Options:

A.

Yes, by asking the administrator for credentials.

B.

Yes, using appropriate attack techniques.

C.

No, FTP is very secure.

Buy Now
Questions 11

What is Rhost in metasploit?

Options:

A.

Remote host.

B.

Local root variable.

C.

Root host.

Buy Now
Questions 12

What is privilege escalation?

Options:

A.

It is the term used by major hackers to refer to the request for new permissions to your account with hacked administrators.

B.

A term used in computer security to describe the situation in which a user or process acquires greater permissions or privileges than they originally had.

C.

Is the term used when you request elevated permissions to your account with the administrator.

Buy Now
Questions 13

What is malware?

Options:

A.

Refers to any software specifically designed to protect, safeguard and store data on a device, network or system.

B.

Refers to any software specifically designed to damage, infect, steal data or otherwise cause a nuisance to a device, network or computer system, without the owner's consent.

C.

It is an Antivirus for servers especially.

Buy Now
Questions 14

Can Nmap be used for vulnerability scanning?

Options:

A.

YES, nmap has this capability as well.

B.

NO, other software is used for that purpose.

C.

NO, nmap can only perform port scanning.

Buy Now
Questions 15

What is an Acceptable Use Policy?

Options:

A.

An acceptable use policy (AUP) is a type of security policy directed at all employees with access to one or more organizational assets.

B.

A NON-Acceptable Use Policy (AUP) is a type of security policy directed at all employees with access to one or more organizational assets.

C.

Are the terms and conditions in the software.

Buy Now
Questions 16

What is Nessus used for?

Options:

A.

To watch videos on a blocked network.

B.

To scan a network or system for vulnerabilities.

C.

For automated hacking.

Buy Now
Questions 17

What is a CVE?

Options:

A.

Common Non-Vulnerable Entries that list secure systems.

B.

A hacker magazine available for purchase.

C.

Common Vulnerabilities and Exposures (CVE) is a publicly available list of known computer security vulnerabilities.

Buy Now
Questions 18

Are brute force attacks extremely fast and effective?

Options:

A.

NO, this type of attack take a long time and there is a probability that it will not work.

B.

YES, since the dictionaries on the Internet are very complete.

C.

YES, no matter what specifications your computer has.

Buy Now
Questions 19

Is it illegal to practice with VulnHub machines?

Options:

A.

Yes, because you are hacking into a system without authorization.

B.

No, because these machines are intentionally vulnerable and used in a local, isolated environment for learning and practice.

C.

No, because these machines do not contain vulnerabilities and are only meant to be observed.

Buy Now
Questions 20

What is Whois?

Options:

A.

It is a public directory through which you can know "who is" the owner of a domain or IP address.

B.

It is a directory by which it is possible to know where exactly the owner of a domain or IP address lives.

C.

It is a physical directory where names and ip addresses can be consulted since the beginning of the Internet.

Buy Now
Questions 21

Can an FTP protocol be breached?

Options:

A.

NO, it is very safe.

B.

YES, with the appropriate techniques.

C.

YES, asking the administrator for the user and password.

Buy Now
Questions 22

Who uses Metasploit?

Options:

A.

Agricultural engineers.

B.

Food engineers.

C.

Cybersecurity experts.

Buy Now
Questions 23

Can ransomware attacks happen to anyone or only to large companies?

Options:

A.

We can all be infected by ransomware.

B.

Only large companies with very important data.

C.

Only computers with Windows 7 and XP.

Buy Now
Questions 24

What is a Firewall?

Options:

A.

It is a firewall that serves to protect the server.

B.

It is a computer security measure designed to protect a network, computer system or device against external or internal threats by monitoring, controlling and filtering network traffic according to a set of predefined rules.

C.

It is a protection system designed so that hackers cannot be discovered.

Buy Now
Questions 25

Do hackers only perform criminal acts?

Options:

A.

Hackers do not exist. B. YES, they are only dedicated to exploiting vulnerabilities. C. NO, there are ethical hackers who are in charge of analyzing and reporting vulnerabilities.

Buy Now
Questions 26

What is Netcat?

Options:

A.

It is a hacking tool designed only for Windows systems.

B.

It is a versatile, open-source networking tool used for reading and writing data over network connections.

C.

It is a hacking tool designed only for Linux systems.

Buy Now
Questions 27

What is ZAP?

Options:

A.

ZAP is a closed source penetration testing tool used to evaluate online servers.

B.

It is a term used to describe the collection and analysis of information from publicly available sources, such as websites, social networks, government databases, news articles, among other resources freely available on the web.

C.

It is an open-source penetration testing tool used to evaluate the security of web applications.

Buy Now
Questions 28

What is a Whitehack?

Options:

A.

A person who creates exploits with the sole purpose of exposing existing vulnerable systems.

B.

It is a type of hacker who exploits vulnerabilities in search of information that can compromise a company and sell this information in order to make a profit regardless of the damage it may cause to the organization.

C.

Refers to a computer security professional or expert who uses their skills and knowledge to identify and fix vulnerabilities in systems, networks or applications for the purpose of improving security and protecting against potential cyber threats.

Buy Now
Questions 29

According to what was covered in the course, is it possible to perform phishing outside our network?

Options:

A.

Yes, the learned method works outside the local network and has been proven to be used by attackers to their advantage.

B.

No, the learned method only works in a local environment.

C.

No, the learned method does not work on all devices.

Buy Now
Questions 30

What is a security breach?

Options:

A.

A cybersecurity incident that results in unauthorized access to personal or corporate data.

B.

The hacking of the entire internet.

C.

An internet shutdown or breakup.

Buy Now
Questions 31

What is a security breach?

Options:

A.

It is the hacking of the entire Internet.

B.

It's an Internet breakup.

C.

It consists of a cyber security incident that affects personal or corporate data in different ways.

Buy Now
Questions 32

What is a passive recognition?

Options:

A.

Recognizes the target but does not do anything.

B.

Gathering information by interacting with the target.

C.

Gathering information without interacting with the target.

Buy Now
Questions 33

What is Shodan?

Options:

A.

A fast-food delivery application.

B.

A web browser that competes with Chrome and Bing.

C.

A specialized search engine that scans and collects information about devices connected to the internet.

Buy Now
Exam Code: CEHPC
Exam Name: Ethical Hacking Professional Certification Exam
Last Update: Feb 6, 2026
Questions: 112

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now CEHPC testing engine

PDF (Q&A)

$43.57  $124.49
buy now CEHPC pdf