Spring Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

CEHPC Ethical Hacking Professional Certification Exam Questions and Answers

Questions 4

Is it illegal to practice with vulnhub machines?

Options:

A.

NO, since these machines do not have existing vulnerabilities, it is only useful to see them.

B.

YES, you are hacking into a system without authorization.

C.

NO, since these machines are in a local environment and do not have contact with any organization.

Buy Now
Questions 5

What is an Acceptable Use Policy?

Options:

A.

An acceptable use policy (AUP) is a type of security policy directed at all employees with access to one or more organizational assets.

B.

A NON-Acceptable Use Policy (AUP) is a type of security policy directed at all employees with access to one or more of the organization's assets.

C.

Are the terms and conditions in the software.

Buy Now
Questions 6

As pentester can we exploit any vulnerability regardless of the affectations?

Options:

A.

YES, we have all the freedom.

B.

NO, since performing these acts without consent is a crime.

C.

YES, we have all the power to perform these processes without consent.

Buy Now
Questions 7

Is it important to perform penetration testing for companies?

Options:

A.

Yes, in order to sell the information.

B.

Yes, in order to protect information and systems.

C.

No, because hackers do not exist.

Buy Now
Questions 8

What is ethical responsibility in hacking?

Options:

A.

Performing scanning activities with technical knowledge only.

B.

Ensuring that scanning and testing are performed with proper authorization and for legitimate purposes.

C.

Ensuring that scanning is performed without permission and for illegitimate purposes.

Buy Now
Questions 9

Is it possible to perform geolocation phishing?

Options:

A.

Yes, but with paid tools.

B.

YES, it can be done with a seeker.

C.

NO, it is a very complicated technique.

Buy Now
Questions 10

What is XSS (Cross-Site Scripting)?

Options:

A.

It is a security vulnerability that occurs in web applications when user-supplied input is not properly validated or sanitized, allowing malicious scripts to execute in a user’s web browser.

B.

It is a type of cloned website created with malicious intent.

C.

It is a security vulnerability that occurs in mobile applications to steal balances or contacts.

Buy Now
Questions 11

Is pinging considered a crime if it is done without authorization?

Options:

A.

No, it is only used to validate if a service or host is active.

B.

No, ping does not work at all.

C.

Yes, privacy is being violated.

Buy Now
Questions 12

What is the Lhost in metasploit?

Options:

A.

Local host.

B.

Host line.

C.

Local hosting.

Buy Now
Questions 13

Options:

A.

sudo apt-get update.

B.

sudo update ++ upgrade.

C.

sudo apt-get update++.

Buy Now
Questions 14

What is a public IP address?

Options:

A.

An IP address that everyone uses.

B.

An IP address assigned by an Internet Service Provider (ISP) that is accessible over the internet.

C.

An IP address assigned by a modem to devices within a local network.

Buy Now
Questions 15

Is it possible to clone a web page?

Options:

A.

No

B.

Yes

Buy Now
Questions 16

What is the main purpose of a "SQL injection" attack?

Options:

A.

Accessing an organization's network.

B.

Intercepting web traffic.

C.

Exploiting a database by manipulating SQL commands.

Buy Now
Questions 17

Can the FTP protocol be breached?

Options:

A.

Yes, by asking the administrator for credentials.

B.

Yes, using appropriate attack techniques.

C.

No, FTP is very secure.

Buy Now
Questions 18

What is a vulnerability scan?

Options:

A.

It is the process of identifying, quantifying and prioritizing vulnerabilities in computer systems.

B.

It is the process of mapping the network and nodes in a building for better distribution.

C.

It is the process of identifying and exploiting gaps no matter what.

Buy Now
Questions 19

What is malware?

Options:

A.

Refers to any software specifically designed to protect, safeguard and store data on a device, network or system.

B.

Refers to any software specifically designed to damage, infect, steal data or otherwise cause a nuisance to a device, network or computer system, without the owner's consent.

C.

It is an Antivirus for servers especially.

Buy Now
Questions 20

What is masquerading?

Options:

A.

A method for masking network traffic only.

B.

A web authentication method.

C.

Impersonating the identity of a legitimate user or system to gain unauthorized access.

Buy Now
Questions 21

What is a passive recognition?

Options:

A.

Recognizes the target but does not do anything.

B.

Gathering information by interacting with the target.

C.

Gathering information without interacting with the target.

Buy Now
Questions 22

Which of the following is a network security protocol designed to authenticate and authorize remote users to securely access network resources?

Options:

A.

SSL (Secure Sockets Layer).

B.

FTP (File Transfer Protocol).

C.

SSH (Secure Shell).

Buy Now
Questions 23

Do hackers only use Linux?

Options:

A.

Yes, since Linux is the only platform that works correctly for these tasks.

B.

Linux and Windows only.

C.

No, hackers use all operating systems.

Buy Now
Questions 24

What is a security breach?

Options:

A.

It is the hacking of the entire Internet.

B.

It's an Internet breakup.

C.

It consists of a cyber security incident that affects personal or corporate data in different ways.

Buy Now
Questions 25

How does Social Engineering work?

Options:

A.

They pretend to be friendly, trustworthy or authoritative people and get people to trust them. Once the person trusts the advisor, they may be helpful in protecting private information.

B.

They pretend to be friendly, trustworthy or authoritative people and trick victims into trusting them. Once the victim trusts the attacker, they can be manipulated into revealing private information.

C.

They pretend to be friendly, trustworthy people and protect the victims so that they trust them. Once the victim trusts the attacker, they can be manipulated to protect private information from being breached.

Buy Now
Questions 26

Do Google dorks show hacked computers?

Options:

A.

YES, Google dorks hacks pages for us in order to access data. B. NO, Google dorks works to search for specific topics. C. YES, Google dorks works as a backdoor to all web pages.

Buy Now
Questions 27

Who uses Metasploit?

Options:

A.

Agricultural engineers.

B.

Food engineers.

C.

Cybersecurity experts.

Buy Now
Questions 28

What is a "backdoor" in terms of computer security?

Options:

A.

A type of malware that spreads through instant messaging. B. A main door to access a system. C. A hidden access to a system that allows bypassing normal authentication.

Buy Now
Questions 29

What is ZAP?

Options:

A.

ZAP is a closed source penetration testing tool used to evaluate online servers.

B.

It is a term used to describe the collection and analysis of information from publicly available sources, such as websites, social networks, government databases, news articles, among other resources freely available on the web.

C.

It is an open-source penetration testing tool used to evaluate the security of web applications.

Buy Now
Questions 30

What operating system is Kali Linux based on?

Options:

A.

Ubuntu

B.

Arch Linux

C.

Debian

Buy Now
Questions 31

Can MD5 be decrypted?

Options:

A.

No, it is a very secure protocol.

B.

Yes, MD5 hashes can be cracked using modern tools, online databases, or precomputed hash tables.

C.

No, it is a very secure encryption algorithm.

Buy Now
Questions 32

What is Netcat?

Options:

A.

It is a hacking tool designed only for Windows systems.

B.

It is a versatile, open-source networking tool used for reading and writing data over network connections.

C.

It is a hacking tool designed only for Linux systems.

Buy Now
Questions 33

What is Google Hacking?

Options:

A.

Refers to the use of advanced search techniques in the Google engine to find public information without vulnerabilities in websites and systems.

B.

It is a special browser for ethical hackers seeking to protect systems.

C.

It refers to the use of certain advanced search techniques in Google's search engine to find sensitive information or vulnerabilities in websites and systems.

Buy Now
Exam Code: CEHPC
Exam Name: Ethical Hacking Professional Certification Exam
Last Update: Feb 20, 2026
Questions: 112

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now CEHPC testing engine

PDF (Q&A)

$31.5  $104.99
buy now CEHPC pdf
dumpsmate guaranteed to pass

24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 21 Feb 2026