Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the CertiProf Ethical Hacking Professional CEHPC Questions and answers with Dumpstech

Exam CEHPC Premium Access

View all detail and faqs for the CEHPC exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions
Questions # 21:

Do hackers only use Linux?

Options:

A.

Yes, since Linux is the only platform that works correctly for these tasks.

B.

Linux and Windows only.

C.

No, hackers use all operating systems.

Questions # 22:

What is netcat?

Options:

A.

It is a versatile, open-source network tool used for reading and writing data over network connections.

B.

It is a hacking tool for Linux.

C.

It is a hacking tool for Windows.

Questions # 23:

What is a reverse shell?

Options:

A.

It refers to a process in which the victim's machine connects to the attacker's machine to receive commands.

B.

It refers to when the terminal is run with root.

C.

A common Linux command console.

Questions # 24:

Can Nmap be used for vulnerability scanning?

Options:

A.

YES, nmap has this capability as well.

B.

NO, other software is used for that purpose.

C.

NO, nmap can only perform port scanning.

Questions # 25:

What is a black hat hacker?

Options:

A.

They use their computer skills to steal confidential information, to infect computer systems, to restrict access to a system.

B.

They use their computer skills to protect confidential information to restrict access to a system.

C.

They check the wiring of installations, provide support to users and are aware of servers in small companies.

Questions # 26:

What is Netcat?

Options:

A.

It is a hacking tool designed only for Windows systems.

B.

It is a versatile, open-source networking tool used for reading and writing data over network connections.

C.

It is a hacking tool designed only for Linux systems.

Questions # 27:

Do Google Dorks show hacked computers or systems?

Options:

A.

No, Google Dorks are used to search for specific information indexed by search engines.

B.

Yes, Google Dorks work as a backdoor to all web pages.

C.

Yes, Google Dorks hack pages automatically to access data.

Questions # 28:

According to what we have seen in the course, is it possible to do phishing outside our network?

Options:

A.

NO, the learned method does not work with all devices. B. YES, the learned method works perfectly and it is proven that hackers can perform this process to their advantage. C. NO, the learned method only works in a local environment.

Questions # 29:

Can ransomware attacks happen to anyone or only to large companies?

Options:

A.

We can all be infected by ransomware.

B.

Only large companies with very important data.

C.

Only computers with Windows 7 and XP.

Questions # 30:

Is it important to perform pentesting to companies?

Options:

A.

YES, in order to protect the information.

B.

NO, since hackers do not exist.

C.

YES, in order to sell the information.

Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions