Sample+Exam+CEHPC+(V0220224)+EN
Sample+Exam+CEHPC+(V0220224)+EN
A. Fan7a5ma
B. The Hackers
C. Anonymous
2. What is netcat?
A. It is a command line tool for writing and reading data over the network. Netcat uses TCP/IP
and UDP network protocols for data transmission.
B. It is a hacking tool for Windows.
C. It is a hacking tool for Linux.
A. It is a widely recognized and widely used cybersecurity framework developed by the MITRE
Corporation. It is intended to provide a detailed and structured framework describing
tactics, techniques, and procedures.
B. It is a widely recognized and widely used cybercriminal work process developed by the
NMAP Corporation. It is intended to provide a detailed framework of reference.
C. It is a widely recognized and widely used cybercriminal work process developed by the Kali
Linux Corporation. It is intended to provide a detailed framework.
A. PETS is a set of tools, methods, practices and approaches designed to safeguard and
enhance the privacy and security of personal information in digital environments.
B. PETS are standards and practices for breaching computer equipment and stealing
information.
C. PETS are controlled environments where we can practice hacking are machines prepared to
be hacked.
5. What is a router?
A. It is a network device that is used to route and forward data traffic between computer
networks.
B. It is a device that functions as an antivirus on servers.
C. It is a network protocol for exchanging data in a secure manner.
6. What is a Honeypot?
7. What is Denial-of-Service?
8. What is a threat?
A. It is any event, action, person, entity or situation that may jeopardize the confidentiality,
integrity or availability of an organization's or user's systems, data, networks or digital
information.
B. It is any event that can protect users within our organization.
C. It is any event, action, person, entity or situation that may compromise the integrity or
availability of an organization's or user's systems, data, networks or digital information.
9. What is a vulnerability?
A. They are inexperienced hackers who use automated tools to carry out attacks, without
having a deep knowledge of how computer systems and networks work.
B. They are hackers who are experts in the field and have in-depth knowledge.
C. They are hacking tool developers, always on the cutting edge.
A. It focuses on evaluating the security of the network infrastructure, looking for possible
vulnerabilities that could be exploited by attackers.
B. It is focused on evaluating organizations for the proper functioning of these organizations.
C. Focuses on evaluating the security of web applications, looking for possible vulnerabilities in
their code, such as SQL injections, XSS, CSRF, among others.
A. Black box testing involves performing a security assessment with all the prior knowledge of
the network infrastructure.
B. Black box testing involves performing a security assessment and testing without prior
knowledge of the infrastructure or network infrastructure approve.
C. It is the test where you are given all the company's information to test all accesses.
A. It checks that the systems are patched and have no critical and exploitable vulnerabilities.
B. It reviews the protocols to be followed by the IT area to solve problems.
C. Exploitation of all vulnerabilities is performed.
17. What is Post - Exploitation?
A. In this phase all the systems are exploited with the purpose of selling the information.
B. In this phase we have access to the system, so we will execute the activities that will allow
us to obtain the control of the equipment in a total way, to generate users, to elevate
privileges, to enter to the information.
C. At this point, we will violate everything we can, leaving the information exposed to the
entire Internet.
A. It is a technique that uses Google's advanced search to search for sensitive or confidential
information on the web.
B. It is the search for information in books.
C. It is searching for videos on TikTok and YouTube.
A. To clone IP.
B. To clone web pages.
C. To clone DNS.
A. It is a social network where hackers from all over the world interact.
B. It is a blog where hacking and security techniques for companies are shared.
C. It is an online platform that acts as a compilation of open-source tools and resources to
perform open-source intelligence.
23. What is end-to-end encryption?
28. Which of the following is a type of attack that uses multiple compromised devices to
perform the attack?
A. Phishing
B. DDoS.
C. Pharming.
29. What is "SQL Injection" in terms of hacking?
A. Denial of Software.
B. Detection of Systems.
C. Denial of Service.
A. YES, you permanently activate the programs without paying for them.
B. NO, since the cracks come previously installed for the best operation of Windows servers.
C. NO, since they are loaded with malicious software.
A. It is an open-source tool that allows you to automate the process of a SQL injection attack.
B. It is a paid tool to manage sql databases.
C. It is Google Chrome's competitor.
A. A Web Application Firewall (WAF) protects the web application server from multiple
attacks.
B. A Web Application Form (WAF) protects printers from multiple attacks.
C. A Web Application Functional (WAF) protects computers from multiple attacks.
A. Windows.
B. Ubuntu.
C. Debian.
56. Besides Kali Linux, what other operating system is used for hacking?
A. Parrot OS.
B. Hannah Montana Linux.
C. Windows XP.
58. Which command would you use in Nmap to scan the entire 192.168.100.1 network and
view operating system and ports?
A. Servers.
B. Wi-Fi network.
C. People.
A. It is a technique used in cybersecurity and ethical hacking that allows an attacker to gain
access to a remote machine and control it from an external location.
B. It is a technique used in cybersecurity and ethical hacking that allows a hacker to gain access
to the Wi-Fi network remotely and control traffic from an external location.
C. It is a technique used for port scanning.
A. They use their computer skills to steal confidential information, to infect computer systems,
to restrict access to a system.
B. They use their computer skills to protect confidential information in order to restrict access
to a system.
C. They check the wiring of facilities, support users and are aware of servers in small
businesses.
A. It refers to politicians who get involved in social issues by facing the consequences in the
news.
B. It refers to hacking into a computer system for political or social purposes. A hacktivist
breaks into a computer system, but always for the purpose of influencing ideological,
religious, political or social causes.
C. They use their computing skills to steal confidential information, to infect computer systems,
to restrict access to a system.
A. It is a document where passwords are stored that could possibly be the correct ones to
enter the system.
B. A common dictionary, it contains words and their meaning.
C. A plain text document where passwords are usually stored.
A. Back Hat.
B. Hacktivists.
C. Ethical Hackers.
67. Are all Wi-Fi networks secure?
A. Yes.
B. No.
68. Which vulnerability times should be solved with the highest priority?
A. High.
B. Medium.
C. Low.
A. It removes viruses.
B. It improves performance.
C. Encrypts all files.
A. Yes.
B. No.