Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the CertiProf Ethical Hacking Professional CEHPC Questions and answers with CertsForce

Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions
Questions # 11:

What is an Acceptable Use Policy?

Options:

A.

An acceptable use policy (AUP) is a type of security policy directed at all employees with access to one or more organizational assets.


B.

A NON-Acceptable Use Policy (AUP) is a type of security policy directed at all employees with access to one or more organizational assets.


C.

Are the terms and conditions in the software.


Expert Solution
Questions # 12:

What is a hacktivist?

Options:

A.

Refers to politicians who get involved in social issues by being in the news. B. They use their computer skills to steal sensitive information, to infect computer systems, to restrict access to a system. C. Refers to hacking into a computer system for political or social purposes. A hacktivist breaks into a computer system, but always with the aim of influencing ideological, religious, political or social causes.


Expert Solution
Questions # 13:

What is Google Hacking?

Options:

A.

Refers to the use of advanced search techniques in the Google engine to find public information without vulnerabilities in websites and systems.


B.

It is a special browser for ethical hackers seeking to protect systems.


C.

It refers to the use of certain advanced search techniques in Google's search engine to find sensitive information or vulnerabilities in websites and systems.


Expert Solution
Questions # 14:

What is a dictionary used for brute-force attacks?

Options:

A.

A common dictionary that contains words and their meanings.


B.

A plain text document where passwords are usually stored.


C.

A document containing a list of possible passwords that may successfully authenticate into a system.


Expert Solution
Questions # 15:

Is it possible to perform geolocation phishing?

Options:

A.

Yes, but with paid tools.


B.

YES, it can be done with a seeker.


C.

NO, it is a very complicated technique.


Expert Solution
Questions # 16:

When critical vulnerabilities are detected, what should be done?

Options:

A.

Document the problem and do nothing.


B.

Exploit it and extract as much information as possible.


C.

Inform the corresponding area for a prompt solution.


Expert Solution
Questions # 17:

What is ethical responsibility in hacking?

Options:

A.

Performing scanning activities with technical knowledge only.


B.

Ensuring that scanning and testing are performed with proper authorization and for legitimate purposes.


C.

Ensuring that scanning is performed without permission and for illegitimate purposes.


Expert Solution
Questions # 18:

Do Google dorks show hacked computers?

Options:

A.

YES, Google dorks hacks pages for us in order to access data. B. NO, Google dorks works to search for specific topics. C. YES, Google dorks works as a backdoor to all web pages.


Expert Solution
Questions # 19:

What is a reverse shell?

Options:

A.

It refers to a process in which the victim's machine connects to the attacker's machine to receive commands.


B.

It refers to when the terminal is run with root.


C.

A common Linux command console.


Expert Solution
Questions # 20:

What is malware?

Options:

A.

Refers to any software specifically designed to protect, safeguard and store data on a device, network or system.


B.

Refers to any software specifically designed to damage, infect, steal data or otherwise cause a nuisance to a device, network or system without the owner's consent.


C.

It is an Antivirus for servers especially.


Expert Solution
Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions