Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

CEHPC Ethical Hacking Professional Certification Exam Questions and Answers

Questions 4

Which of the following is an example of social engineering?

Options:

A.

Asking users to disclose their passwords over the phone.

B.

Using antivirus software.

C.

Periodically updating the operating system.

Buy Now
Questions 5

Options:

A.

It refers to a process in which the victim ' s machine connects to the attacker ' s machine to receive commands.

B.

It refers to when the terminal is run with root.

C.

A common Linux command console.

Buy Now
Questions 6

Besides Kali Linux, what other operating system is used for hacking?

Options:

A.

Hannah Montana Linux.

B.

Windows xp

C.

Parrot OS.

Buy Now
Questions 7

What is a reverse shell?

Options:

A.

It refers to a process in which the victim ' s machine connects to the attacker ' s machine to receive commands.

B.

It refers to when the terminal is run with root.

C.

A common Linux command console.

Buy Now
Questions 8

Is it illegal to practice with vulnhub machines?

Options:

A.

NO, since these machines do not have existing vulnerabilities, it is only useful to see them.

B.

YES, you are hacking into a system without authorization.

C.

NO, since these machines are in a local environment and do not have contact with any organization.

Buy Now
Questions 9

Can all computers be hacked?

Options:

A.

Yes, all computer equipment can be hacked without any complications. B. Yes, all are hackable. C. No, only those that are not updated by security patches, both operating system and programs and exposed ports.

Buy Now
Questions 10

What is ethical responsibility in hacking?

Options:

A.

Performing scanning activities with technical knowledge only.

B.

Ensuring that scanning and testing are performed with proper authorization and for legitimate purposes.

C.

Ensuring that scanning is performed without permission and for illegitimate purposes.

Buy Now
Questions 11

What is a security breach?

Options:

A.

A cybersecurity incident that results in unauthorized access to personal or corporate data.

B.

The hacking of the entire internet.

C.

An internet shutdown or breakup.

Buy Now
Questions 12

What is privilege escalation?

Options:

A.

A term used in computer security to describe a situation where a user or process gains higher permissions than originally assigned.

B.

A term used when a user formally requests elevated permissions from a system administrator.

C.

A term used by hackers to describe asking compromised administrators for new permissions.

Buy Now
Questions 13

What is SQL Injection?

Options:

A.

The manipulation of SQL queries to access, modify, or delete data within a database without authorization.

B.

A database system used by hackers.

C.

SQL code execution that only administrators can perform.

Buy Now
Questions 14

Is it possible to perform geolocation phishing?

Options:

A.

Yes, but with paid tools.

B.

YES, it can be done with a seeker.

C.

NO, it is a very complicated technique.

Buy Now
Questions 15

What is malware?

Options:

A.

Refers to any software specifically designed to protect, safeguard and store data on a device, network or system.

B.

Refers to any software specifically designed to damage, infect, steal data or otherwise cause a nuisance to a device, network or system without the owner ' s consent.

C.

It is an Antivirus for servers especially.

Buy Now
Questions 16

What is a firewall?

Options:

A.

A device or software that monitors and filters network traffic to help prevent unauthorized access.

B.

Software that only protects against viruses.

C.

A method for hacking systems remotely.

Buy Now
Questions 17

What is the Lhost in metasploit?

Options:

A.

Local host.

B.

Host line.

C.

Local hosting.

Buy Now
Questions 18

What is Netcat?

Options:

A.

It is a hacking tool designed only for Windows systems.

B.

It is a versatile, open-source networking tool used for reading and writing data over network connections.

C.

It is a hacking tool designed only for Linux systems.

Buy Now
Questions 19

Do Google Dorks show hacked computers or systems?

Options:

A.

No, Google Dorks are used to search for specific information indexed by search engines.

B.

Yes, Google Dorks work as a backdoor to all web pages.

C.

Yes, Google Dorks hack pages automatically to access data.

Buy Now
Questions 20

Is it important to perform penetration testing for companies?

Options:

A.

Yes, in order to sell the information.

B.

Yes, in order to protect information and systems.

C.

No, because hackers do not exist.

Buy Now
Questions 21

What is Shodan?

Options:

A.

A fast-food delivery application.

B.

A web browser that competes with Chrome and Bing.

C.

A specialized search engine that scans and collects information about devices connected to the internet.

Buy Now
Questions 22

What is a CVE?

Options:

A.

Common Non-Vulnerable Entries that list secure systems.

B.

A hacker magazine available for purchase.

C.

Common Vulnerabilities and Exposures (CVE) is a publicly available list of known computer security vulnerabilities.

Buy Now
Questions 23

What is an " exploit " in the hacking world?

Options:

A.

A malicious program that spreads through social networks.

B.

A code designed to exploit a specific vulnerability in a system.

C.

A technique for removing malware.

Buy Now
Questions 24

Can MD5 be decrypted?

Options:

A.

No, it is a very secure protocol.

B.

Yes, MD5 hashes can be cracked using modern tools, online databases, or precomputed hash tables.

C.

No, it is a very secure encryption algorithm.

Buy Now
Questions 25

Can Kali Linux only be used by criminals?

Options:

A.

YES, criminal acts are carried out with it.

B.

YES, it is a prohibited system.

C.

NO, it can be used by cybersecurity enthusiasts.

Buy Now
Questions 26

Options:

A.

A person who creates exploits with the sole purpose of exposing existing vulnerable systems.

B.

It is a type of hacker who exploits vulnerabilities in search of information that can compromise a company and sell this information in order to make a profit regardless of the damage it may cause to the organization.

C.

Refers to a computer security professional or expert who uses their skills and knowledge to identify and fix vulnerabilities in systems, networks or applications for the purpose of improving security and protecting against potential cyber threats.

Buy Now
Questions 27

What is an Acceptable Use Policy?

Options:

A.

An acceptable use policy (AUP) is a type of security policy directed at all employees with access to one or more organizational assets.

B.

A NON-Acceptable Use Policy (AUP) is a type of security policy directed at all employees with access to one or more organizational assets.

C.

Are the terms and conditions in the software.

Buy Now
Questions 28

What is malware?

Options:

A.

Refers to any software specifically designed to protect, safeguard and store data on a device, network or system.

B.

Refers to any software specifically designed to damage, infect, steal data or otherwise cause a nuisance to a device, network or computer system, without the owner ' s consent.

C.

It is an Antivirus for servers especially.

Buy Now
Questions 29

Is the use of cracks good for the equipment?

Options:

A.

NO, since they are loaded with malicious software.

B.

NO, since the cracks are pre-installed for the best performance of Windows servers.

C.

YES, you permanently activate programs without payment.

Buy Now
Questions 30

What is a " backdoor " in terms of computer security?

Options:

A.

A type of malware that spreads through instant messaging. B. A main door to access a system. C. A hidden access to a system that allows bypassing normal authentication.

Buy Now
Questions 31

Can all computers be hacked?

Options:

A.

No, only computers that are not updated with security patches and have exposed ports can be hacked.

B.

Yes, all computer equipment can be hacked without any complications.

C.

Yes, all computers are hackable.

Buy Now
Exam Code: CEHPC
Exam Name: Ethical Hacking Professional Certification Exam
Last Update: May 12, 2026
Questions: 112

PDF + Testing Engine

$64.99  $185.69

Testing Engine

$49.99  $142.83
buy now CEHPC testing engine

PDF (Q&A)

$54.99  $157.11
buy now CEHPC pdf