Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the CertiProf Ethical Hacking Professional CEHPC Questions and answers with CertsForce

Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
Questions # 1:

What is a "backdoor" in terms of computer security?

Options:

A.

A type of malware that spreads through instant messaging. B. A main door to access a system. C. A hidden access to a system that allows bypassing normal authentication.


Expert Solution
Questions # 2:

What is XSS (Cross-Site Scripting)?

Options:

A.

It is a security vulnerability that occurs in web applications when user-supplied input is not properly validated or sanitized, allowing malicious scripts to execute in a user’s web browser.


B.

It is a type of cloned website created with malicious intent.


C.

It is a security vulnerability that occurs in mobile applications to steal balances or contacts.


Expert Solution
Questions # 3:

Are brute force attacks extremely fast and effective?

Options:

A.

NO, this type of attack take a long time and there is a probability that it will not work.


B.

YES, since the dictionaries on the Internet are very complete.


C.

YES, no matter what specifications your computer has.


Expert Solution
Questions # 4:

Do Google Dorks show hacked computers or systems?

Options:

A.

No, Google Dorks are used to search for specific information indexed by search engines.


B.

Yes, Google Dorks work as a backdoor to all web pages.


C.

Yes, Google Dorks hack pages automatically to access data.


Expert Solution
Questions # 5:

What is a SQL Injection?

Options:

A.

It is a SQL code execution that only the administrator can perform.


B.

It is a database used by hackers.


C.

Manipulation of SQL queries to access, modify or delete data in a database.


Expert Solution
Questions # 6:

Which of the following is an example of social engineering?

Options:

A.

Asking users to disclose their passwords over the phone.


B.

Using antivirus software.


C.

Periodically updating the operating system.


Expert Solution
Questions # 7:

What is Netcat?

Options:

A.

It is a hacking tool designed only for Windows systems.


B.

It is a versatile, open-source networking tool used for reading and writing data over network connections.


C.

It is a hacking tool designed only for Linux systems.


Expert Solution
Questions # 8:

What is a backdoor in terms of computer security?

Options:

A.

A hidden access mechanism in a system that allows bypassing normal authentication or security controls.


B.

A type of malware that spreads through instant messaging applications.


C.

A main or official entry point used to access a system.


Expert Solution
Questions # 9:
Options:

A.

The malicious code is permanently stored on the server.


B.

The source code of the page, this can be html or javascript.


C.

In this type of attack, the malicious code is sent to the web server via an HTTP request. The server then processes the request and returns a response that includes the malicious code.


Expert Solution
Questions # 10:

What is Shodan?

Options:

A.

A fast-food delivery application.


B.

A web browser that competes with Chrome and Bing.


C.

A specialized search engine that scans and collects information about devices connected to the internet.


Expert Solution
Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions