Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

CEHPC Ethical Hacking Professional Certification Exam Questions and Answers

Questions 4

How do you look for an exploit in metasploit?

Options:

A.

Use.

B.

Cannot be searched.

C.

Search.

Buy Now
Questions 5

Options:

A.

A file inside the machine with a key word or letters to check that it was successfully breached. B. A common flag with a pirate skull in meaning of hackers. C. A list of commands used as a guide to hack the machine.

Buy Now
Questions 6

What is a reverse shell?

Options:

A.

It refers to a process in which the victim's machine connects to the attacker's machine to receive commands.

B.

It refers to when the terminal is run with root.

C.

A common Linux command console.

Buy Now
Questions 7

As pentester can we exploit any vulnerability regardless of the affectations?

Options:

A.

YES, we have all the freedom.

B.

NO, since performing these acts without consent is a crime.

C.

YES, we have all the power to perform these processes without consent.

Buy Now
Questions 8

What is an "exploit" in the hacking world?

Options:

A.

A malicious program that spreads through social networks.

B.

A code designed to exploit a specific vulnerability in a system.

C.

A technique for removing malware.

Buy Now
Questions 9

Can ransomware attacks happen to anyone or only to large companies?

Options:

A.

We can all be infected by ransomware.

B.

Only large companies with very important data.

C.

Only computers with Windows 7 and XP.

Buy Now
Questions 10

What is the most vulnerable within an organization?

Options:

A.

Servers

B.

Wi-Fi network

C.

Individuals

Buy Now
Questions 11

What is an Acceptable Use Policy?

Options:

A.

An acceptable use policy (AUP) is a type of security policy directed at all employees with access to one or more organizational assets.

B.

A NON-Acceptable Use Policy (AUP) is a type of security policy directed at all employees with access to one or more organizational assets.

C.

Are the terms and conditions in the software.

Buy Now
Questions 12

Options:

A.

Hannah Montana Linux.

B.

Windows XP.

C.

Parrot OS.

Buy Now
Questions 13

Do hackers only perform criminal acts?

Options:

A.

Hackers do not exist. B. YES, they are only dedicated to exploiting vulnerabilities. C. NO, there are ethical hackers who are in charge of analyzing and reporting vulnerabilities.

Buy Now
Questions 14

What is a hacktivist?

Options:

A.

Refers to politicians who get involved in social issues by being in the news. B. They use their computer skills to steal sensitive information, to infect computer systems, to restrict access to a system. C. Refers to hacking into a computer system for political or social purposes. A hacktivist breaks into a computer system, but always with the aim of influencing ideological, religious, political or social causes.

Buy Now
Questions 15

What is a passive recognition?

Options:

A.

Recognizes the target but does not do anything.

B.

Gathering information by interacting with the target.

C.

Gathering information without interacting with the target.

Buy Now
Questions 16

Can all computers be hacked?

Options:

A.

No, only computers that are not updated with security patches and have exposed ports can be hacked.

B.

Yes, all computer equipment can be hacked without any complications.

C.

Yes, all computers are hackable.

Buy Now
Questions 17

Who uses Metasploit?

Options:

A.

Agricultural engineers.

B.

Food engineers.

C.

Cybersecurity experts.

Buy Now
Questions 18

What is a private IP?

Options:

A.

It is the IP address assigned by the service provider.

B.

It is an IP that no one can use.

C.

Private IP addresses are used to enable communication between devices within a local network.

Buy Now
Questions 19

Options:

A.

A person who creates exploits with the sole purpose of exposing existing vulnerable systems.

B.

It is a type of hacker who exploits vulnerabilities in search of information that can compromise a company and sell this information in order to make a profit regardless of the damage it may cause to the organization.

C.

Refers to a computer security professional or expert who uses their skills and knowledge to identify and fix vulnerabilities in systems, networks or applications for the purpose of improving security and protecting against potential cyber threats.

Buy Now
Questions 20

What is a security breach?

Options:

A.

It is the hacking of the entire Internet.

B.

It's an Internet breakup.

C.

It consists of a cyber security incident that affects personal or corporate data in different ways.

Buy Now
Questions 21

What is a black hat hacker?

Options:

A.

They use their computer skills to steal confidential information, to infect computer systems, to restrict access to a system.

B.

They use their computer skills to protect confidential information to restrict access to a system.

C.

They check the wiring of installations, provide support to users and are aware of servers in small companies.

Buy Now
Questions 22

What is an exploit in the hacking world?

Options:

A.

A piece of code designed to take advantage of a specific vulnerability in a system or application.

B.

A technique used to remove malware from a system.

C.

A malicious program that spreads through social networks.

Buy Now
Questions 23

Can the FTP protocol be breached?

Options:

A.

Yes, by asking the administrator for credentials.

B.

Yes, using appropriate attack techniques.

C.

No, FTP is very secure.

Buy Now
Questions 24

Is it important to perform penetration testing for companies?

Options:

A.

Yes, in order to sell the information.

B.

Yes, in order to protect information and systems.

C.

No, because hackers do not exist.

Buy Now
Questions 25

Which of the following is a network security protocol designed to authenticate and authorize remote users to securely access network resources?

Options:

A.

SSH (Secure Shell)

B.

FTP (File Transfer Protocol)

C.

SSL (Secure Sockets Layer)

Buy Now
Questions 26

What operating system is Kali Linux based on?

Options:

A.

Ubuntu

B.

Arch Linux

C.

Debian

Buy Now
Questions 27

What is Whois?

Options:

A.

It is a public directory through which you can know "who is" the owner of a domain or IP address.

B.

It is a directory by which it is possible to know where exactly the owner of a domain or IP address lives.

C.

It is a physical directory where names and ip addresses can be consulted since the beginning of the Internet.

Buy Now
Questions 28

What is a Whitehack?

Options:

A.

A person who creates exploits with the sole purpose of exposing existing vulnerable systems.

B.

It is a type of hacker who exploits vulnerabilities in search of information that can compromise a company and sell this information in order to make a profit regardless of the damage it may cause to the organization.

C.

Refers to a computer security professional or expert who uses their skills and knowledge to identify and fix vulnerabilities in systems, networks or applications for the purpose of improving security and protecting against potential cyber threats.

Buy Now
Questions 29

What is the best practice to protect against malware?

Options:

A.

Install and keep antivirus software up to date.

B.

Sharing login information on suspicious websites.

C.

Click on suspicious links to verify their authenticity.

Buy Now
Questions 30

What is ZAP?

Options:

A.

ZAP is a closed source penetration testing tool used to evaluate online servers.

B.

It is a term used to describe the collection and analysis of information from publicly available sources, such as websites, social networks, government databases, news articles, among other resources freely available on the web.

C.

It is an open-source penetration testing tool used to evaluate the security of web applications.

Buy Now
Questions 31

What is the best practice to protect against malware?

Options:

A.

Sharing login information on suspicious websites.

B.

Clicking on suspicious links to verify their authenticity.

C.

Installing and keeping antivirus software up to date.

Buy Now
Questions 32

Do hackers only use Linux?

Options:

A.

Yes, since Linux is the only platform that works correctly for these tasks.

B.

Linux and Windows only.

C.

No, hackers use all operating systems.

Buy Now
Questions 33

How does Social Engineering work?

Options:

A.

They pretend to be friendly, trustworthy or authoritative people and get people to trust them. Once the person trusts the advisor, they may be helpful in protecting private information.

B.

They pretend to be friendly, trustworthy or authoritative people and trick victims into trusting them. Once the victim trusts the attacker, they can be manipulated into revealing private information.

C.

They pretend to be friendly, trustworthy people and protect the victims so that they trust them. Once the victim trusts the attacker, they can be manipulated to protect private information from being breached.

Buy Now
Exam Code: CEHPC
Exam Name: Ethical Hacking Professional Certification Exam
Last Update: Mar 25, 2026
Questions: 112

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99