Spring Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CEHPC Questions and Answers

Question # 6

What is a flag inside intentionally vulnerable machines?

A.

A list of commands used as a guide to hack the machine.

B.

A file inside the machine containing a keyword or string that proves the system was successfully compromised.

C.

A symbolic pirate flag representing hackers.

Full Access
Question # 7

What is Phishing?

A.

It is a type of cyber-attack in which attackers try to trick people to obtain confidential information, such as usernames.

B.

It is the method to brute force passwords in web pages.

C.

It is a technique used to capture network traffic in order to obtain passwords in plain text.

Full Access
Question # 8

Is the use of cracks good for the equipment?

A.

NO, since they are loaded with malicious software.

B.

NO, since the cracks are pre-installed for the best performance of Windows servers.

C.

YES, you permanently activate programs without payment.

Full Access
Question # 9

Do hackers only perform criminal acts?

A.

Hackers do not exist. B. YES, they are only dedicated to exploiting vulnerabilities. C. NO, there are ethical hackers who are in charge of analyzing and reporting vulnerabilities.

Full Access
Question # 10

How does Social Engineering work?

A.

They pretend to be friendly, trustworthy or authoritative people and get people to trust them. Once the person trusts the advisor, they may be helpful in protecting private information.

B.

They pretend to be friendly, trustworthy or authoritative people and trick victims into trusting them. Once the victim trusts the attacker, they can be manipulated into revealing private information.

C.

They pretend to be friendly, trustworthy people and protect the victims so that they trust them. Once the victim trusts the attacker, they can be manipulated to protect private information from being breached.

Full Access
Question # 11

What is a zero-day vulnerability?

A.

A security flaw that is publicly known.

B.

A vulnerability that has been exploited for more than a year.

C.

A vulnerability that does not have a patch available.

Full Access
Question # 12

What is malware?

A.

Refers to any software specifically designed to protect, safeguard and store data on a device, network or system.

B.

Refers to any software specifically designed to damage, infect, steal data or otherwise cause a nuisance to a device, network or computer system, without the owner's consent.

C.

It is an Antivirus for servers especially.

Full Access
Question # 13

What is a WAF?

A.

A Web Application Form (WAF) protects printers from multiple attacks.

B.

A Web Application Functionality (WAF) protects computers from multiple attacks.

C.

A Web Application Firewall (WAF) protects the web application server from multiple attacks.

Full Access
Question # 14

What is a reverse shell?

A.

It refers to a process in which the victim's machine connects to the attacker's machine to receive commands.

B.

It refers to when the terminal is run with root.

C.

A common Linux command console.

Full Access
Question # 15

What is a CVE?

A.

Common Non-Vulnerable Entries that list secure systems.

B.

A hacker magazine available for purchase.

C.

Common Vulnerabilities and Exposures (CVE) is a publicly available list of known computer security vulnerabilities.

Full Access
Question # 16

Which of the following is an example of social engineering?

A.

Use of antivirus software. B. Periodic updating of the operating system. C. Ask users to disclose their password over the phone.

Full Access
Question # 17

What is the main purpose of a "SQL injection" attack?

A.

Accessing an organization's network.

B.

Intercepting web traffic.

C.

Exploiting a database by manipulating SQL commands.

Full Access
Question # 18

Is it illegal to practice with VulnHub machines?

A.

Yes, because you are hacking into a system without authorization.

B.

No, because these machines are intentionally vulnerable and used in a local, isolated environment for learning and practice.

C.

No, because these machines do not contain vulnerabilities and are only meant to be observed.

Full Access
Question # 19

What is "root" in Linux?

A.

It is the most important file in Linux since it is the root of the system.

B.

Pre-installed user on Linux to log in.

C.

Is the name of the user who has the highest level of privileges within the system.

Full Access
Question # 20

Can MD5 be decrypted?

A.

No, it is a very secure protocol.

B.

Yes, MD5 hashes can be cracked using modern tools, online databases, or precomputed hash tables.

C.

No, it is a very secure encryption algorithm.

Full Access
Question # 21

Besides Kali Linux, what other operating system is used for hacking?

A.

Hannah Montana Linux.

B.

Windows xp

C.

Parrot OS.

Full Access
Question # 22

According to what we have seen in the course, is it possible to do phishing outside our network?

A.

NO, the learned method does not work with all devices. B. YES, the learned method works perfectly and it is proven that hackers can perform this process to their advantage. C. NO, the learned method only works in a local environment.

Full Access
Question # 23

What is an "exploit" in the hacking world?

A.

A malicious program that spreads through social networks.

B.

A code designed to exploit a specific vulnerability in a system.

C.

A technique for removing malware.

Full Access
Question # 24

Can ransomware attacks happen to anyone or only to large companies?

A.

We can all be infected by ransomware.

B.

Only large companies with very important data.

C.

Only computers with Windows 7 and XP.

Full Access
Question # 25

What is a firewall?

A.

Software that protects against viruses.

B.

A method for hacking systems remotely.

C.

A device that monitors network traffic and helps prevent unauthorized access.

Full Access
Question # 26

Can all computers be hacked?

A.

Yes, all computer equipment can be hacked without any complications. B. Yes, all are hackable. C. No, only those that are not updated by security patches, both operating system and programs and exposed ports.

Full Access
Question # 27

What is the best practice to protect against malware?

A.

Sharing login information on suspicious websites.

B.

Clicking on suspicious links to verify their authenticity.

C.

Installing and keeping antivirus software up to date.

Full Access
Question # 28

As pentester can we exploit any vulnerability regardless of the affectations?

A.

YES, we have all the freedom.

B.

NO, since performing these acts without consent is a crime.

C.

YES, we have all the power to perform these processes without consent.

Full Access
Question # 29

What is a Whitehack?

A.

A person who creates exploits with the sole purpose of exposing existing vulnerable systems.

B.

It is a type of hacker who exploits vulnerabilities in search of information that can compromise a company and sell this information in order to make a profit regardless of the damage it may cause to the organization.

C.

Refers to a computer security professional or expert who uses their skills and knowledge to identify and fix vulnerabilities in systems, networks or applications for the purpose of improving security and protecting against potential cyber threats.

Full Access
Question # 30

What is Whois?

A.

It is a public directory through which you can know "who is" the owner of a domain or IP address.

B.

It is a directory by which it is possible to know where exactly the owner of a domain or IP address lives.

C.

It is a physical directory where names and ip addresses can be consulted since the beginning of the Internet.

Full Access
Question # 31

Do Google dorks show hacked computers?

A.

YES, Google dorks hacks pages for us in order to access data. B. NO, Google dorks works to search for specific topics. C. YES, Google dorks works as a backdoor to all web pages.

Full Access
Question # 32

What is a reverse shell?

A.

It refers to when the terminal is run with root privileges.

B.

A common Linux command-line console.

C.

It refers to a process in which the victim’s machine initiates a connection back to the attacker’s machine to receive commands.

Full Access
Question # 33

Do Google Dorks show hacked computers or systems?

A.

No, Google Dorks are used to search for specific information indexed by search engines.

B.

Yes, Google Dorks work as a backdoor to all web pages.

C.

Yes, Google Dorks hack pages automatically to access data.

Full Access