Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = discmirror

Pass the CertiProf Ethical Hacking Professional CEHPC Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam CEHPC Premium Access

View all detail and faqs for the CEHPC exam


376 Students Passed

87% Average Score

96% Same Questions
Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
Questions # 1:

When critical vulnerabilities are detected, what should be done?

Options:

A.

Document the problem and do nothing.

B.

Exploit it and extract as much information as possible.

C.

Inform the corresponding area for a prompt solution.

Questions # 2:

What is the most vulnerable within an organization?

Options:

A.

Servers

B.

Wi-Fi network

C.

Individuals

Questions # 3:

Which of the following was a famous hacktivist group?

Options:

A.

Anonymous

B.

Fan7a5ma

C.

Hackers

Questions # 4:

Do hackers only perform criminal acts?

Options:

A.

Hackers do not exist. B. YES, they are only dedicated to exploiting vulnerabilities. C. NO, there are ethical hackers who are in charge of analyzing and reporting vulnerabilities.

Questions # 5:

If a web page has HTTPS, does it mean that it is legitimate?

Options:

A.

No, since HTTPS only indicates that the connection is encrypted.

B.

Yes, since it shows the padlock.

C.

Yes, the HTTPS connection always appears on 100% secure sites.

Questions # 6:

How does Social Engineering work?

Options:

A.

They pretend to be friendly, trustworthy or authoritative people and get people to trust them. Once the person trusts the advisor, they may be helpful in protecting private information.

B.

They pretend to be friendly, trustworthy or authoritative people and trick victims into trusting them. Once the victim trusts the attacker, they can be manipulated into revealing private information.

C.

They pretend to be friendly, trustworthy people and protect the victims so that they trust them. Once the victim trusts the attacker, they can be manipulated to protect private information from being breached.

Questions # 7:

As pentester can we exploit any vulnerability regardless of the affectations?

Options:

A.

YES, we have all the freedom.

B.

NO, since performing these acts without consent is a crime.

C.

YES, we have all the power to perform these processes without consent.

Questions # 8:

What is the main purpose of a "SQL injection" attack?

Options:

A.

Accessing an organization's network.

B.

Intercepting web traffic.

C.

Exploiting a database by manipulating SQL commands.

Questions # 9:

What is a reverse shell?

Options:

A.

It refers to a process in which the victim's machine connects to the attacker's machine to receive commands.

B.

It refers to when the terminal is run with root.

C.

A common Linux command console.

Questions # 10:

What is ransomware?

Options:

A.

A type of malicious software that encrypts files and demands a ransom for their release.

B.

A security protocol to protect confidential data.

C.

A cloud backup service.

Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.