Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CertiProf CEHPC - Ethical Hacking Professional Certification Exam

Page: 3 / 4
Total 112 questions

Is it possible to perform geolocation phishing?

A.

Yes, but with paid tools.

B.

YES, it can be done with a seeker.

C.

NO, it is a very complicated technique.

What is a "backdoor" in terms of computer security?

A.

A type of malware that spreads through instant messaging. B. A main door to access a system. C. A hidden access to a system that allows bypassing normal authentication.

What is risk assessment?

A.

It is the process to buy antivirus.

B.

Is the process of comparing the results of the risk analysis with the risk assessment criteria to determine whether the risk or its magnitude is acceptable or tolerable.

C.

It is the process of comparing the results of the analysis with other companies.

What is a WAF?

A.

A Web Application Form (WAF) protects printers from multiple attacks.

B.

A Web Application Functionality (WAF) protects computers from multiple attacks.

C.

A Web Application Firewall (WAF) protects the web application server from multiple attacks.

Which of the following is a network security protocol designed to authenticate and authorize remote users to securely access network resources?

A.

SSH (Secure Shell)

B.

FTP (File Transfer Protocol)

C.

SSL (Secure Sockets Layer)

What is active reconnaissance?

A.

Recognizes the target but does nothing.

B.

Observes the target without performing any direct actions.

C.

Gathers information by directly interacting with the target.

What is an XSS?

A.

It is a type of cloned website with malicious intent.

B.

It is a security vulnerability that occurs in mobile applications stealing balance or contacts.

C.

It is a security vulnerability that occurs in web applications when data provided by users is not properly filtered and malicious scripts are executed in the web browser of other users.

What is "root" in Linux?

A.

It is the most important file in Linux since it is the root of the system.

B.

Pre-installed user on Linux to log in.

C.

Is the name of the user who has the highest level of privileges within the system.

What is Netcat?

A.

It is a hacking tool designed only for Windows systems.

B.

It is a versatile, open-source networking tool used for reading and writing data over network connections.

C.

It is a hacking tool designed only for Linux systems.

Do hackers only perform criminal acts?

A.

Hackers do not exist. B. YES, they are only dedicated to exploiting vulnerabilities. C. NO, there are ethical hackers who are in charge of analyzing and reporting vulnerabilities.