Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CertiProf CEHPC - Ethical Hacking Professional Certification Exam

Page: 1 / 4
Total 112 questions

What is the Lhost in metasploit?

A.

Local host.

B.

Host line.

C.

Local hosting.

Can all computers be hacked?

A.

Yes, all computer equipment can be hacked without any complications. B. Yes, all are hackable. C. No, only those that are not updated by security patches, both operating system and programs and exposed ports.

A.

The malicious code is permanently stored on the server.

B.

The source code of the page, this can be html or javascript.

C.

In this type of attack, the malicious code is sent to the web server via an HTTP request. The server then processes the request and returns a response that includes the malicious code.

What is a dictionary used for brute-force attacks?

A.

A common dictionary that contains words and their meanings.

B.

A plain text document where passwords are usually stored.

C.

A document containing a list of possible passwords that may successfully authenticate into a system.

What is malware?

A.

Refers to any software specifically designed to protect, safeguard and store data on a device, network or system.

B.

Refers to any software specifically designed to damage, infect, steal data or otherwise cause a nuisance to a device, network or computer system, without the owner's consent.

C.

It is an Antivirus for servers especially.

What is a public IP?

A.

Public IP addresses are assigned by Internet service providers.

B.

It is the IP address assigned by the modem to the devices.

C.

It is an IP that everyone uses.

What is the results report document?

A.

A document that lists tasks left unfinished due to time constraints.

B.

A document that details findings, including identified vulnerabilities and exposed sensitive information.

C.

A document used only to sign the agreement with the client.

What tool would you use to scan ports?

A.

Metasploit

B.

Nmap

C.

Shodan

What is a Firewall?

A.

It is a firewall that serves to protect the server.

B.

It is a computer security measure designed to protect a network, computer system or device against external or internal threats by monitoring, controlling and filtering network traffic according to a set of predefined rules.

C.

It is a protection system designed so that hackers cannot be discovered.

Besides Kali Linux, what other operating system is used for hacking?

A.

Hannah Montana Linux.

B.

Windows xp

C.

Parrot OS.