Spring Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

CEHPC Sample Questions Answers

Questions 4

Options:

A.

A file inside the machine with a key word or letters to check that it was successfully breached. B. A common flag with a pirate skull in meaning of hackers. C. A list of commands used as a guide to hack the machine.

Buy Now
Questions 5

What is Netcat?

Options:

A.

It is a hacking tool designed only for Windows systems.

B.

It is a versatile, open-source networking tool used for reading and writing data over network connections.

C.

It is a hacking tool designed only for Linux systems.

Buy Now
Questions 6

Is it possible to clone a web page?

Options:

A.

No

B.

Yes

Buy Now
Questions 7

What is a WAF?

Options:

A.

A Web Application Form (WAF) protects printers from multiple attacks.

B.

A Web Application Functionality (WAF) protects computers from multiple attacks.

C.

A Web Application Firewall (WAF) protects the web application server from multiple attacks.

Buy Now
Questions 8

What is Nessus used for?

Options:

A.

To watch videos on a blocked network.

B.

To scan a network or system for vulnerabilities.

C.

For automated hacking.

Buy Now
Questions 9

What is a flag inside intentionally vulnerable machines?

Options:

A.

A list of commands used as a guide to hack the machine.

B.

A file inside the machine containing a keyword or string that proves the system was successfully compromised.

C.

A symbolic pirate flag representing hackers.

Buy Now
Questions 10

Can all computers be hacked?

Options:

A.

No, only computers that are not updated with security patches and have exposed ports can be hacked.

B.

Yes, all computer equipment can be hacked without any complications.

C.

Yes, all computers are hackable.

Buy Now
Questions 11

When critical vulnerabilities are detected, what should be done?

Options:

A.

Document the problem and do nothing.

B.

Exploit it and extract as much information as possible.

C.

Inform the corresponding area for a prompt solution.

Buy Now
Questions 12

Can the ssh protocol be breached?

Options:

A.

YES, as long as it is not correctly configured.

B.

NO, it is a 100% secure protocol.

C.

NO, it is impossible, there is no way to do it.

Buy Now
Questions 13

What is Rhost in metasploit?

Options:

A.

Remote host.

B.

Local root variable.

C.

Root host.

Buy Now
Questions 14

What is "root" in Linux?

Options:

A.

It is the most important file in Linux since it is the root of the system.

B.

Pre-installed user on Linux to log in.

C.

Is the name of the user who has the highest level of privileges within the system.

Buy Now
Questions 15

What is the Lhost in metasploit?

Options:

A.

Local host.

B.

Host line.

C.

Local hosting.

Buy Now
Questions 16

Can all computers be hacked?

Options:

A.

Yes, all computer equipment can be hacked without any complications. B. Yes, all are hackable. C. No, only those that are not updated by security patches, both operating system and programs and exposed ports.

Buy Now
Questions 17

What tool would you use to search for hidden directories or files?

Options:

A.

Dirb

B.

Shodan

C.

Ping

Buy Now
Questions 18

Which of the following is a network security protocol designed to authenticate and authorize remote users to securely access network resources?

Options:

A.

SSH (Secure Shell)

B.

FTP (File Transfer Protocol)

C.

SSL (Secure Sockets Layer)

Buy Now
Questions 19

Do all hackers always carry out criminal activities?

Options:

A.

Yes, all hackers commit crimes such as hacking banks or social media accounts.

B.

No, ethical hackers responsibly report discovered vulnerabilities to the appropriate organization for remediation.

C.

Yes, hackers always sell stolen information to the highest bidder.

Buy Now
Questions 20

What is a zero-day vulnerability?

Options:

A.

A security flaw that is publicly known.

B.

A vulnerability that has been exploited for more than a year.

C.

A vulnerability that does not have a patch available.

Buy Now
Questions 21

What is a White Hat hacker?

Options:

A.

A cybersecurity professional who uses their skills to legally identify and fix vulnerabilities in systems, networks, or applications to improve security.

B.

A person who creates exploits solely to expose vulnerable systems without authorization.

C.

A hacker who exploits vulnerabilities to steal or sell sensitive information for personal profit.

Buy Now
Questions 22

What is the best practice to protect against malware?

Options:

A.

Install and keep antivirus software up to date.

B.

Sharing login information on suspicious websites.

C.

Click on suspicious links to verify their authenticity.

Buy Now
Questions 23

Is it illegal to practice with VulnHub machines?

Options:

A.

Yes, because you are hacking into a system without authorization.

B.

No, because these machines are intentionally vulnerable and used in a local, isolated environment for learning and practice.

C.

No, because these machines do not contain vulnerabilities and are only meant to be observed.

Buy Now
Questions 24

Is pinging considered a crime if it is done without authorization?

Options:

A.

No, it is only used to validate if a service or host is active.

B.

No, ping does not work at all.

C.

Yes, privacy is being violated.

Buy Now
Questions 25

What is Phishing?

Options:

A.

It is a type of cyber-attack in which attackers try to trick people to obtain confidential information, such as usernames.

B.

It is the method to brute force passwords in web pages.

C.

It is a technique used to capture network traffic in order to obtain passwords in plain text.

Buy Now
Questions 26

Besides Kali Linux, what other operating system is used for hacking?

Options:

A.

Hannah Montana Linux.

B.

Windows xp

C.

Parrot OS.

Buy Now
Questions 27

Is it illegal to practice with vulnhub machines?

Options:

A.

NO, since these machines do not have existing vulnerabilities, it is only useful to see them.

B.

YES, you are hacking into a system without authorization.

C.

NO, since these machines are in a local environment and do not have contact with any organization.

Buy Now
Questions 28

What is a reverse shell?

Options:

A.

It refers to when the terminal is run with root privileges.

B.

A common Linux command-line console.

C.

It refers to a process in which the victim’s machine initiates a connection back to the attacker’s machine to receive commands.

Buy Now
Questions 29

Is it important to perform penetration testing for companies?

Options:

A.

Yes, in order to sell the information.

B.

Yes, in order to protect information and systems.

C.

No, because hackers do not exist.

Buy Now
Questions 30

What is a Firewall?

Options:

A.

It is a firewall that serves to protect the server.

B.

It is a computer security measure designed to protect a network, computer system or device against external or internal threats by monitoring, controlling and filtering network traffic according to a set of predefined rules.

C.

It is a protection system designed so that hackers cannot be discovered.

Buy Now
Questions 31

As pentester can we exploit any vulnerability regardless of the affectations?

Options:

A.

YES, we have all the freedom.

B.

NO, since performing these acts without consent is a crime.

C.

YES, we have all the power to perform these processes without consent.

Buy Now
Questions 32

What is the most vulnerable within an organization?

Options:

A.

Servers.

B.

Wi-Fi network.

C.

Individuals.

Buy Now
Questions 33

Can Nmap be used for vulnerability scanning?

Options:

A.

YES, nmap has this capability as well.

B.

NO, other software is used for that purpose.

C.

NO, nmap can only perform port scanning.

Buy Now
Exam Code: CEHPC
Exam Name: Ethical Hacking Professional Certification Exam
Last Update: Mar 14, 2026
Questions: 112
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now CEHPC