Spring Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Ethical Hacking Professional Certification Exam Question and Answers

Ethical Hacking Professional Certification Exam

Last Update Mar 22, 2026
Total Questions : 112

We are offering FREE CEHPC CertiProf exam questions. All you do is to just go and sign up. Give your details, prepare CEHPC free exam questions and then go for complete pool of Ethical Hacking Professional Certification Exam test questions that will help you more.

CEHPC pdf

CEHPC PDF

$36.75  $104.99
CEHPC Engine

CEHPC Testing Engine

$43.75  $124.99
CEHPC PDF + Engine

CEHPC PDF + Testing Engine

$57.75  $164.99
Questions 1

Can ransomware attacks happen to anyone or only to large companies?

Options:

A.  

We can all be infected by ransomware.

B.  

Only large companies with very important data.

C.  

Only computers with Windows 7 and XP.

Discussion 0
Questions 2

How does Social Engineering work?

Options:

A.  

They pretend to be friendly, trustworthy or authoritative people and get people to trust them. Once the person trusts the advisor, they may be helpful in protecting private information. B. They pretend to be friendly, trustworthy or authoritative people and trick victims into trusting them. Once the victim trusts the attacker they can be manipulated into revealing private information. C. They pretend to be friendly, trustworthy people and p

Discussion 0
Questions 3

If a web page has HTTPS, does it mean that it is legitimate?

Options:

A.  

No, since HTTPS only indicates that the connection is encrypted.

B.  

Yes, since it shows the padlock.

C.  

Yes, the HTTPS connection always appears on 100% secure sites.

Discussion 0
Questions 4

According to what was covered in the course, is it possible to perform phishing outside our network?

Options:

A.  

Yes, the learned method works outside the local network and has been proven to be used by attackers to their advantage.

B.  

No, the learned method only works in a local environment.

C.  

No, the learned method does not work on all devices.

Discussion 0
Questions 5

What is a firewall?

Options:

A.  

A device or software that monitors and filters network traffic to help prevent unauthorized access.

B.  

Software that only protects against viruses.

C.  

A method for hacking systems remotely.

Discussion 0
Questions 6

Which of the following is an example of social engineering?

Options:

A.  

Asking users to disclose their passwords over the phone.

B.  

Using antivirus software.

C.  

Periodically updating the operating system.

Discussion 0
Questions 7

What is an exploit in the hacking world?

Options:

A.  

A piece of code designed to take advantage of a specific vulnerability in a system or application.

B.  

A technique used to remove malware from a system.

C.  

A malicious program that spreads through social networks.

Discussion 0
Questions 8

Can MD5 be decrypted?

Options:

A.  

No, it is a very secure protocol.

B.  

Yes, MD5 hashes can be cracked using modern tools, online databases, or precomputed hash tables.

C.  

No, it is a very secure encryption algorithm.

Discussion 0
Questions 9

Do Google dorks show hacked computers?

Options:

A.  

YES, Google dorks hacks pages for us in order to access data. B. NO, Google dorks works to search for specific topics. C. YES, Google dorks works as a backdoor to all web pages.

Discussion 0
Questions 10

What is a firewall?

Options:

A.  

Software that protects against viruses.

B.  

A method for hacking systems remotely.

C.  

A device that monitors network traffic and helps prevent unauthorized access.

Discussion 0
Questions 11

Can Kali Linux only be used by criminals?

Options:

A.  

YES, criminal acts are carried out with it.

B.  

YES, it is a prohibited system.

C.  

NO, it can be used by cybersecurity enthusiasts.

Discussion 0
Questions 12

Can an FTP protocol be breached?

Options:

A.  

NO, it is very safe.

B.  

YES, with the appropriate techniques.

C.  

YES, asking the administrator for the user and password.

Discussion 0
Questions 13

What is a Whitehack?

Options:

A.  

A person who creates exploits with the sole purpose of exposing existing vulnerable systems.

B.  

It is a type of hacker who exploits vulnerabilities in search of information that can compromise a company and sell this information in order to make a profit regardless of the damage it may cause to the organization.

C.  

Refers to a computer security professional or expert who uses their skills and knowledge to identify and fix vulnerabilities in systems, networks or applications for the purpose of improving security and protecting against potential cyber threats.

Discussion 0
Questions 14

What is a vulnerability scan?

Options:

A.  

It is the process of identifying, quantifying and prioritizing vulnerabilities in computer systems.

B.  

It is the process of mapping the network and nodes in a building for better distribution.

C.  

It is the process of identifying and exploiting gaps no matter what.

Discussion 0
Questions 15

According to the course, which program do we use to make osint to email accounts?

Options:

A.  

Sherlock.

B.  

Seeker.

C.  

Shodan.

Discussion 0
Questions 16

Can all computers be hacked?

Options:

A.  

No, only computers that are not updated with security patches and have exposed ports can be hacked.

B.  

Yes, all computer equipment can be hacked without any complications.

C.  

Yes, all computers are hackable.

Discussion 0
Questions 17

How does Social Engineering work?

Options:

A.  

They pretend to be friendly, trustworthy or authoritative people and get people to trust them. Once the person trusts the advisor, they may be helpful in protecting private information.

B.  

They pretend to be friendly, trustworthy or authoritative people and trick victims into trusting them. Once the victim trusts the attacker, they can be manipulated into revealing private information.

C.  

They pretend to be friendly, trustworthy people and protect the victims so that they trust them. Once the victim trusts the attacker, they can be manipulated to protect private information from being breached.

Discussion 0
Questions 18

What is a "backdoor" in terms of computer security?

Options:

A.  

A type of malware that spreads through instant messaging. B. A main door to access a system. C. A hidden access to a system that allows bypassing normal authentication.

Discussion 0
Questions 19

What is Phishing?

Options:

A.  

It is a type of cyber-attack in which attackers try to trick people to obtain confidential information, such as usernames.

B.  

It is the method to brute force passwords in web pages.

C.  

It is a technique used to capture network traffic in order to obtain passwords in plain text.

Discussion 0
Questions 20

What operating system is Kali Linux based on?

Options:

A.  

Ubuntu

B.  

Arch Linux

C.  

Debian

Discussion 0
Questions 21

Which of the following is an example of social engineering?

Options:

A.  

Use of antivirus software. B. Periodic updating of the operating system. C. Ask users to disclose their password over the phone.

Discussion 0
Questions 22

What is a reverse shell?

Options:

A.  

It refers to when the terminal is run with root privileges.

B.  

A common Linux command-line console.

C.  

It refers to a process in which the victim’s machine initiates a connection back to the attacker’s machine to receive commands.

Discussion 0
Questions 23

What is malware?

Options:

A.  

Refers to any software specifically designed to protect, safeguard and store data on a device, network or system.

B.  

Refers to any software specifically designed to damage, infect, steal data or otherwise cause a nuisance to a device, network or system without the owner's consent.

C.  

It is an Antivirus for servers especially.

Discussion 0
Questions 24

What is XSS (Cross-Site Scripting)?

Options:

A.  

It is a security vulnerability that occurs in web applications when user-supplied input is not properly validated or sanitized, allowing malicious scripts to execute in a user’s web browser.

B.  

It is a type of cloned website created with malicious intent.

C.  

It is a security vulnerability that occurs in mobile applications to steal balances or contacts.

Discussion 0
Questions 25

What is a security breach?

Options:

A.  

It is the hacking of the entire Internet.

B.  

It's an Internet breakup.

C.  

It consists of a cyber security incident that affects personal or corporate data in different ways.

Discussion 0
Questions 26

What is Google Hacking?

Options:

A.  

Refers to the use of advanced search techniques in the Google engine to find public information without vulnerabilities in websites and systems.

B.  

It is a special browser for ethical hackers seeking to protect systems.

C.  

It refers to the use of certain advanced search techniques in Google's search engine to find sensitive information or vulnerabilities in websites and systems.

Discussion 0
Questions 27

What is ethical responsibility in hacking?

Options:

A.  

Performing scanning activities with technical knowledge only.

B.  

Ensuring that scanning and testing are performed with proper authorization and for legitimate purposes.

C.  

Ensuring that scanning is performed without permission and for illegitimate purposes.

Discussion 0
Questions 28

What is a hacktivist?

Options:

A.  

Refers to politicians who get involved in social issues by being in the news. B. They use their computer skills to steal sensitive information, to infect computer systems, to restrict access to a system. C. Refers to hacking into a computer system for political or social purposes. A hacktivist breaks into a computer system, but always with the aim of influencing ideological, religious, political or social causes.

Discussion 0
Questions 29

What is a Firewall?

Options:

A.  

It is a firewall that serves to protect the server.

B.  

It is a computer security measure designed to protect a network, computer system or device against external or internal threats by monitoring, controlling and filtering network traffic according to a set of predefined rules.

C.  

It is a protection system designed so that hackers cannot be discovered.

Discussion 0
Questions 30

What is an Acceptable Use Policy?

Options:

A.  

An acceptable use policy (AUP) is a type of security policy directed at all employees with access to one or more organizational assets.

B.  

A NON-Acceptable Use Policy (AUP) is a type of security policy directed at all employees with access to one or more organizational assets.

C.  

Are the terms and conditions in the software.

Discussion 0
Questions 31

Which of the following is a network security protocol designed to authenticate and authorize remote users to securely access network resources?

Options:

A.  

SSL (Secure Sockets Layer).

B.  

FTP (File Transfer Protocol).

C.  

SSH (Secure Shell).

Discussion 0
Questions 32

What is netcat?

Options:

A.  

It is a versatile, open-source network tool used for reading and writing data over network connections.

B.  

It is a hacking tool for Linux.

C.  

It is a hacking tool for Windows.

Discussion 0
Questions 33

Which of the following was a famous hacktivist group?

Options:

A.  

Anonymous

B.  

Fan7a5ma

C.  

Hackers

Discussion 0