CertiProf CEHPC - Ethical Hacking Professional Certification Exam
If a web page has HTTPS, does it mean that it is legitimate?
No, since HTTPS only indicates that the connection is encrypted.
Yes, since it shows the padlock.
Yes, the HTTPS connection always appears on 100% secure sites.
The Answer Is:
AExplanation:
In modern web security, the presence of HTTPS (Hypertext Transfer Protocol Secure) is often misinterpreted as a universal seal of "legitimacy" or "safety". However, from an ethical hacking perspective, HTTPS only provides a technical guarantee ofconfidentialityandintegrityfor data in transit. It uses SSL/TLS protocols to encrypt the communication channel between a user’s browser and the web server, preventing unauthorized third parties from eavesdropping on sensitive information like login credentials or credit card numbers.
Encryption, while vital, does not validate the underlying intent or trustworthiness of the website owner. Malicious actors frequently obtain valid SSL certificates—which can be issued for free by various providers—to host phishing sites that appear professional and "secure". When a user sees the "padlock" icon in their browser, it merely confirms that the connection is encrypted; it does not mean the site is free from malware, that it isn't a fraudulent clone of a bank, or that the organization behind it is legally verified.
A site can have a perfectly configured HTTPS connection but still contain critical vulnerabilities such as Cross-Site Scripting (XSS), SQL injection, or unpatched server software. Furthermore, misconfigurations in HTTPS implementation—such as the use of outdated protocols like SSLv3 or weak encryption ciphers—can leave the "secure" connection itself vulnerable to attacks like man-in-the-middle (MITM) interceptions. Ethical hackers must educate users and organizations that "secure" only refers to thepipethrough which data travels, not thedestinationitself. True legitimacy is determined by certificate transparency, business reputation, and a lack of application-layer vulnerabilities, which a simple padlock cannot guarantee.
What is an Acceptable Use Policy?
An acceptable use policy (AUP) is a type of security policy directed at all employees with access to one or more organizational assets.
A NON-Acceptable Use Policy (AUP) is a type of security policy directed at all employees with access to one or more organizational assets.
Are the terms and conditions in the software.
The Answer Is:
AExplanation:
An Acceptable Use Policy (AUP) is a foundational administrative control and a formal document that outlines the rules and behaviors expected of employees, contractors, and other stakeholders when using an organization’s information technology assets. These assets include computers, networks, internet access, email systems, and mobile devices. The primary purpose of an AUP is to protect the organization from legal liability, security breaches, and productivity losses by clearly defining what constitutes "acceptable" versus "forbidden" activity.
A robust AUP typically covers several key areas:
Prohibited Activities: Explicitly forbidding illegal acts, harassment, accessing inappropriate content (such as pornography), or using company resources for personal gain.
Data Protection: Requiring employees to protect passwords and sensitive data, and forbidding the unauthorized installation of software.
Monitoring and Privacy: Informing users that the company reserves the right to monitor network traffic and that there is no expectation of privacy on corporate systems.
Consequences: Stating the disciplinary actions that will be taken if the policy is violated.
From an ethical hacking and auditing perspective, the AUP is often the first document reviewed. If a user’s poor security habits lead to a breach, the AUP provides the legal and administrative framework for the organization to respond. Furthermore, a well-communicated AUP serves as a "deterrent control," discouraging employees from engaging in risky behaviors that could open the door to social engineering or malware infections. It is a critical component of "Governance, Risk, and Compliance" (GRC) within any enterprise.
Which command is used to update Kali Linux from the console?
sudo update upgrade
sudo apt-get update••
sudo apt-get update
The Answer Is:
CExplanation:
Updating an operating system is a fundamental aspect of maintaininginformation security hygiene, especially in security-focused distributions such as Kali Linux. The correct command used to update the package list in Kali Linux from the console is sudo apt-get update, making option C the correct answer.
This command synchronizes the local package index with the repositories configured on the system. It does not install upgrades itself but retrieves the latest information about available software versions and security patches. Ethical hackers and security professionals rely on updated systems to ensure that tools function correctly and that known vulnerabilities are patched.
Option A is incorrect because it is not a valid Linux command. Option B is incorrect due to invalid characters and improper syntax. Proper command accuracy is critical in security environments, as incorrect commands can lead to system instability or incomplete updates.
From an ethical hacking standpoint, keeping Kali Linux updated ensures access to the latest penetration testing tools, vulnerability scanners, and security fixes. Many exploits target outdated software, so regular updates significantly reduce exposure to known threats.
Understanding system maintenance commands supports secure operations and reinforces best practices in defensive security and professional ethical hacking workflows.
What is a flag inside intentionally vulnerable machines?
A list of commands used as a guide to hack the machine.
A file inside the machine containing a keyword or string that proves the system was successfully compromised.
A symbolic pirate flag representing hackers.
The Answer Is:
BExplanation:
In penetration testing labs and intentionally vulnerable machines, a flag is afile or string placed inside the system to verify successful exploitation, making option B the correct answer. Flags are commonly used in Capture The Flag (CTF) challenges, training platforms, and vulnerable virtual machines.
Flags typically contain a unique keyword, hash, or identifier that can only be accessed after exploiting a vulnerability or achieving a specific level of access, such as user or root privileges. Ethical hackers use flags to confirm progress and validate that attack objectives have been met.
Option A is incorrect because flags do not provide instructions or guidance. Option C is incorrect because flags are not symbolic images or representations.
From an ethical hacking education perspective, flags serve asmeasurable proof of exploitation success. They help learners track achievements and ensure that vulnerabilities were exploited correctly rather than guessed or bypassed incorrectly.
Understanding flags reinforces structured penetration testing methodologies, clear objectives, and verification steps. In professional environments, flags conceptually translate to proof-of-concept evidence provided in penetration testing reports to demonstrate risk and impact.
What is Masquerading?
Consists of impersonating the identity of a legitimate user of a computer system or its environment.
A method for masking network traffic.
Web authentication method.
The Answer Is:
AExplanation:
Masquerading is a sophisticated attack vector that consists of an unauthorized user or process impersonating the identity of a legitimate user, system, or service within a computer environment. In the context of cybersecurity, the goal of masquerading is to bypass authentication controls and gain access to restricted resources or information by appearing as a trusted entity. This is often a critical step in the "Gaining Access" phase of a cyberattack, as it allows the attacker to operate under the radar of traditional security logging.
There are several ways masquerading can manifest:
User Impersonation: An attacker uses stolen credentials (usernames and passwords) to log into a system as a legitimate employee.
IP Spoofing: An attacker crafts network packets with a forged source IP address to make it appear as though the traffic is coming from a trusted internal machine.
Email Spoofing: An attacker sends an email that appears to come from a known, trusted source (like an executive or a bank) to trick the recipient into performing an action, such as revealing a password.
Managing and mitigating the threat of masquerading requires robust "Identity and Access Management" (IAM) controls. The most effective defense is Multi-Factor Authentication (MFA). Even if an attacker successfully masquerades as a user by stealing their password, the MFA requirement provides a second layer of verification that is much harder to forge. Additionally, organizations can use "Behavioral Analytics" to detect anomalies; for example, if a user who typically logs in from London suddenly logs in from a different continent, the system can flag it as a potential masquerading attempt. By understanding that masquerading relies on the manipulation of trust and identity, ethical hackers can help organizations implement "Zero Trust" architectures, where every request is verified regardless of where it appears to originate.
Which of the following was a famous hacktivist group?
Anonymous
Fan7a5ma
Hackers
The Answer Is:
AExplanation:
Anonymous is one of the most well-known and influential hacktivist groups in the history of cybersecurity, making option A the correct answer. Hacktivism refers to the use of hacking techniques to promote political, social, or ideological causes. Understanding hacktivist movements is important when studying current security trends, as these groups have significantly influenced cyber threat landscapes.
Anonymous is characterized as a decentralized collective, meaning it has no formal leadership or membership structure. Its activities have included distributed denial-of-service (DDoS) attacks, website defacements, data leaks, and online campaigns targeting governments, corporations, and organizations perceived to be unethical or oppressive. These actions have brought global attention to issues such as censorship, privacy, corruption, and human rights.
Option B, “Fan7a5ma,†is not a widely recognized or historically significant hacktivist group, and option C, “Hackers,†is a generic term that describes individuals with technical skills rather than an organized hacktivist collective. Therefore, both are incorrect.
From an ethical hacking and defensive security perspective, studying groups like Anonymous helps organizations understand non-financially motivated threats. Hacktivist attacks often aim for public exposure, reputational damage, or service disruption rather than direct monetary gain. This requires different defensive strategies, including improved incident response, public communication planning, and monitoring of geopolitical and social developments that may trigger cyber campaigns.
Understanding hacktivist behavior is essential for modern cybersecurity professionals to anticipate emerging threats and strengthen organizational resilience.
What is the best practice to protect against malware?
Sharing login information on suspicious websites.
Clicking on suspicious links to verify their authenticity.
Installing and keeping antivirus software up to date.
The Answer Is:
CExplanation:
One of the most effective best practices to protect against malware isinstalling and regularly updating antivirus software, making option C the correct answer. Antivirus and endpoint protection solutions are designed to detect, block, and remove malicious software such as viruses, worms, trojans, ransomware, and spyware.
Modern malware evolves rapidly, using obfuscation and zero-day techniques to bypass outdated defenses. Keeping antivirus software up to date ensures that the latest malware signatures, heuristics, and behavioral detection mechanisms are in place. Ethical hackers emphasize this practice because many successful attacks exploit systems with outdated or disabled security software.
Option A is incorrect because sharing login credentials on suspicious websites significantly increases the risk of malware infection and credential theft. Option B is incorrect because clicking on suspicious links is a common infection vector used in phishing and malware distribution campaigns.
From an ethical hacking perspective, malware prevention is part ofdefense-in-depth. Antivirus software should be combined with patch management, least-privilege access, secure browsing habits, and user awareness training. Ethical hackers often demonstrate how quickly unprotected systems can be compromised to highlight the importance of these controls.
Strong malware protection reduces attack surfaces, prevents data loss, and supports incident response efforts. Maintaining updated antivirus software is a foundational information security control in modern environments.
What is a reverse shell?
It refers to a process in which the victim's machine connects to the attacker's machine to receive commands.
It refers to when the terminal is run with root.
A common Linux command console.
The Answer Is:
AExplanation:
A reverse shell is a fundamental technique used during the "Gaining Access" and "Maintaining Access" phases of a penetration test. In a standard (bind) shell, the attacker connects to a specific port on the victim's machine to gain command-line access. However, most modern firewalls block incoming connections to unauthorized ports. To bypass this, a reverse shell reverses the connection logic: the victim's machine is tricked into initiating anoutgoingconnection to the attacker's machine, which is "listening" for the call.
This technique is highly effective because firewalls are typically much more permissive with "egress" (outgoing) traffic than with "ingress" (incoming) traffic. For example, an attacker might host a listener on port 443 (HTTPS). Since most organizations allow internal machines to browse the web over port 443, the firewall perceives the reverse shell connection as standard web traffic and allows it to pass. Once the connection is established, the attacker has a terminal interface on the victim's machine, allowing them to execute commands remotely.
In professional pentesting, establishing a reverse shell is often the primary goal of an exploit. It provides the "foothold" needed for lateral movement and privilege escalation. Common tools used to create reverse shells include Netcat (nc), Bash, and Python scripts. To defend against this, organizations must implement "Egress Filtering," which restricts outgoing traffic to only known, necessary destinations. Security professionals also monitor for "long-lived" connections to unusual IP addresses, as these can be a tell-tale sign of an active reverse shell. Understanding how these connections manipulate network policy is crucial for any ethical hacker seeking to demonstrate how internal systems can be compromised despite robust perimeter defenses.
Is it illegal to practice with VulnHub machines?
Yes, because you are hacking into a system without authorization.
No, because these machines are intentionally vulnerable and used in a local, isolated environment for learning and practice.
No, because these machines do not contain vulnerabilities and are only meant to be observed.
The Answer Is:
BExplanation:
Practicing with VulnHub machines isnot illegalwhen done correctly, making option B the correct answer. VulnHub provides intentionally vulnerable virtual machines designed specifically forlegal and ethical penetration testing practicein controlled environments.
These machines are downloaded and run locally using virtualization software, ensuring that no external organizations or real-world systems are affected. Users are explicitly authorized to test and exploit these systems for educational purposes, making them ideal for learning ethical hacking techniques safely.
Option A is incorrect because authorization is explicitly granted by the creators of VulnHub machines. Option C is incorrect because these machines do contain real vulnerabilities, which is the purpose of the platform.
From an ethical hacking standpoint, practicing in legal environments is essential for skill development without violating laws or ethical standards. VulnHub labs help learners understand reconnaissance, exploitation, privilege escalation, and post-exploitation techniques in a risk-free setting.
Using authorized platforms reinforces responsible hacking behavior, legal compliance, and professional standards. Ethical hackers must always ensure they have explicit permission before testing any system, and VulnHub provides exactly that framework.
According to what we have seen in the course, is it possible to do phishing outside our network?
NO, the learned method does not work with all devices. B. YES, the learned method works perfectly and it is proven that hackers can perform this process to their advantage. C. NO, the learned method only works in a local environment.
The Answer Is:
Explanation:
In the context of a controlled educational environment or a specific laboratory setup for penetration testing, many tools and methods are initially configured to operate within a "Local Area Network" (LAN). This is done to ensure safety, prevent accidental damage to external systems, and simplify the learning of core concepts like DNS spoofing or credential harvesting. Therefore, when a specific course method is described as working only in a "local environment," it means the attack is designed to intercept or redirect traffic within the same broadcast domain or through a local gateway controlled by the student.
In a local environment phishing scenario, an attacker might use tools like Social-Engineer Toolkit (SET) to host a fake login page on their own machine. For a victim to reach this page from "outside" (the internet), the attacker would need to implement additional complex networking configurations. This would include "Port Forwarding" on a router, using a "Static IP," or setting up a "Reverse Proxy" with a registered domain name. Without these external configurations, the phishing site is only reachable by other devices connected to the same local Wi-Fi or Ethernet network.
Understanding the limitations of a "local-only" method is a critical phase of pentesting. It teaches the practitioner about the boundaries of different network layers. While professional hackers obviously perform phishing globally, the "learned method" in many introductory courses serves as a fundamental building block. It focuses on the mechanics of the deception—how a fake page looks and how it captures data—before moving on to the complexities of wide-area network (WAN) exploitation. For a penetration tester, recognizing that an exploit is limited to the local environment is important for defining the "Scope of Work." It ensures that testing remains contained and that the tester understands exactly how a threat would need to pivot to reach an external audience.
