Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CertiProf CEHPC - Ethical Hacking Professional Certification Exam

Page: 2 / 4
Total 112 questions

If a web page has HTTPS, does it mean that it is legitimate?

A.

No, since HTTPS only indicates that the connection is encrypted.

B.

Yes, since it shows the padlock.

C.

Yes, the HTTPS connection always appears on 100% secure sites.

What is an Acceptable Use Policy?

A.

An acceptable use policy (AUP) is a type of security policy directed at all employees with access to one or more organizational assets.

B.

A NON-Acceptable Use Policy (AUP) is a type of security policy directed at all employees with access to one or more organizational assets.

C.

Are the terms and conditions in the software.

Which command is used to update Kali Linux from the console?

A.

sudo update upgrade

B.

sudo apt-get update••

C.

sudo apt-get update

What is a flag inside intentionally vulnerable machines?

A.

A list of commands used as a guide to hack the machine.

B.

A file inside the machine containing a keyword or string that proves the system was successfully compromised.

C.

A symbolic pirate flag representing hackers.

What is Masquerading?

A.

Consists of impersonating the identity of a legitimate user of a computer system or its environment.

B.

A method for masking network traffic.

C.

Web authentication method.

Which of the following was a famous hacktivist group?

A.

Anonymous

B.

Fan7a5ma

C.

Hackers

What is the best practice to protect against malware?

A.

Sharing login information on suspicious websites.

B.

Clicking on suspicious links to verify their authenticity.

C.

Installing and keeping antivirus software up to date.

What is a reverse shell?

A.

It refers to a process in which the victim's machine connects to the attacker's machine to receive commands.

B.

It refers to when the terminal is run with root.

C.

A common Linux command console.

Is it illegal to practice with VulnHub machines?

A.

Yes, because you are hacking into a system without authorization.

B.

No, because these machines are intentionally vulnerable and used in a local, isolated environment for learning and practice.

C.

No, because these machines do not contain vulnerabilities and are only meant to be observed.

According to what we have seen in the course, is it possible to do phishing outside our network?

A.

NO, the learned method does not work with all devices. B. YES, the learned method works perfectly and it is proven that hackers can perform this process to their advantage. C. NO, the learned method only works in a local environment.