Spring Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 4
Total 33 questions
Exam Code: CEHPC                Update: Mar 23, 2026
Exam Name: Ethical Hacking Professional Certification Exam

CertiProf Ethical Hacking Professional Certification Exam CEHPC Exam Dumps: Updated Questions & Answers (March 2026)

Question # 1

What is a WAF?

A.

A Web Application Form (WAF) protects printers from multiple attacks.

B.

A Web Application Functionality (WAF) protects computers from multiple attacks.

C.

A Web Application Firewall (WAF) protects the web application server from multiple attacks.

Question # 2

According to what we have seen in the course, is it possible to do phishing outside our network?

A.

NO, the learned method does not work with all devices. B. YES, the learned method works perfectly and it is proven that hackers can perform this process to their advantage. C. NO, the learned method only works in a local environment.

Question # 3

What is the main purpose of a "SQL injection" attack?

A.

Accessing an organization's network.

B.

Intercepting web traffic.

C.

Exploiting a database by manipulating SQL commands.

Question # 4

What is Phishing?

A.

It is a type of cyber-attack in which attackers try to trick people to obtain confidential information, such as usernames.

B.

It is the method to brute force passwords in web pages.

C.

It is a technique used to capture network traffic in order to obtain passwords in plain text.

Question # 5

Is the use of cracks good for the equipment?

A.

NO, since they are loaded with malicious software.

B.

NO, since the cracks are pre-installed for the best performance of Windows servers.

C.

YES, you permanently activate programs without payment.

Question # 6

What is the best practice to protect against malware?

A.

Sharing login information on suspicious websites.

B.

Clicking on suspicious links to verify their authenticity.

C.

Installing and keeping antivirus software up to date.

Question # 7

What is Nmap?

A.

It is an open-source command-line tool used to scan IP addresses and ports on a network and to detect services, operating systems, and running applications.

B.

It is a Linux-based tool that works specifically to exploit computer vulnerabilities.

C.

It is a program used only for pinging computers within a network or work environment.

Question # 8

Is it possible to perform geolocation phishing?

A.

Yes, but with paid tools.

B.

YES, it can be done with a seeker.

C.

NO, it is a very complicated technique.

Question # 9

What is a reverse shell?

A.

It refers to a process in which the victim's machine connects to the attacker's machine to receive commands.

B.

It refers to when the terminal is run with root.

C.

A common Linux command console.

Question # 10

What is ZAP?

A.

ZAP is a closed source penetration testing tool used to evaluate online servers.

B.

It is a term used to describe the collection and analysis of information from publicly available sources, such as websites, social networks, government databases, news articles, among other resources freely available on the web.

C.

It is an open-source penetration testing tool used to evaluate the security of web applications.

Page: 1 / 4
Total 33 questions

Most Popular Certification Exams

Payment

       

Contact us

Site Secure

mcafee secure

TESTED 23 Mar 2026