Support Questions CEHPC (V0220224) SP
Support Questions CEHPC (V0220224) SP
Professional Knowledge
Ethical Hacking
A. Fan7a5ma
B. The Hackers
C. Anonymous
2. What is netcat?
A. It is a command line tool used to write and read data on the network. For data transmission,
Netcat uses the TCP/IP and UDP network protocols.
B. It is a hacking tool for Windows
C. It is a hacking tool for Linux
A. PETS are a set of tools, methods, practices and approaches designed to safeguard and enhance
the privacy and security of personal information in digital environments.
B. PETS are standards and practices for breaching computer equipment and stealing information.
C. PETS are controlled environments where we can practice hacking. They are machines prepared
to be hacked.
5. What is a router?
A. It is a network device used to direct and forward data traffic between computer networks.
B. It is a device that works as an antivirus on servers.
C. It is a network protocol for secure data exchange.
6. What is a Honeypot?
7. What is Denial-of-Service?
A. Commonly known as DoS (Dos of Service), it is a type of computer protection designed to enable, or
make accessible, the services, resources or systems of a network, server or device, preventing
legitimate users from accessing them.
B. It is a very powerful phishing attack
C. Commonly known as DoS (Denial of Service) or DDoS (Distributed Denial of Service), it is a type of
computer attack designed to interrupt, disable or make inaccessible the services, resources or systems
of a network, server or device, preventing legitimate users from accessing them.
8. What is a threat?
A. It is any event, action, person, entity or situation that may put at risk the confidentiality, integrity or
availability of the systems, data, networks or digital information of an organization or user.
B. It is any event that can protect users within our organization.
C. It is any event, action, person, entity or situation that may compromise the integrity or availability of the
systems, data, networks or digital information of an organization or user.
9. What is a vulnerability?
A. These are the problems that system administrators face regarding documentation.
B. It refers to a configuration problem in the antivirus with which you cannot connect to the internet.
C. It refers to a weakness, failure or error in a system, application, software or device that can be
exploited by an attacker to compromise the security of said system and perform unauthorized actions.
A. Keep your firewall on, software and operating systems updated constantly
B. Don't update anything on the computer
C. Use MAC, they are very safe and there are no viruses.
A. They are inexperienced hackers who use automated tools to carry out attacks, without having a deep
knowledge of how computer systems and networks work.
B. They are expert hackers in the field and have deep knowledge.
C. They are hacking tool developers, always at the forefront
A. It focuses on evaluating the security of the network infrastructure, looking for possible vulnerabilities
that could be exploited by attackers.
B. It focuses on evaluating organizations for their proper functioning.
C. It focuses on evaluating the security of web applications, looking for possible vulnerabilities.
in your code, such as SQL injections, XSS, CSRF, among others
A. Black box testing involves performing a security assessment with all prior knowledge of the network
infrastructure
B. Black box testing involves performing a security assessment and testing without prior knowledge of the
infrastructure or the network infrastructure being tested.
C. It is the test where they give you all the company information so that you can test all the accesses.
A. It is checked that the systems have updated patches and do not have critical and exploitable
vulnerabilities.
B. The protocols to be followed by the IT area to resolve problems are reviewed
C. All vulnerabilities are exploited
A. In this phase all systems are exploited with the purpose of selling the information.
B. In this phase we have access to the system, so we will execute the activities that will allow us to
obtain total control of the equipment, generate users, elevate privileges, and access information.
C. At this point we violate everything we can by leaving the information exposed to the entire Internet.
A. It is a technique that uses Google's advanced search to search for sensitive or confidential information
on the web.
B. It is the search for information in books
C. It is the search for videos on TikTok and YouTube
A. To clone IP
B. To clone web pages
C. To clone DNS
A. It is a social network where hackers from all over the world interact.
B. It is a blog where hacking and security techniques for companies are shared.
C. It is an online platform that acts as a collection of open source tools and resources for performing open
source intelligence.
28. Which of the following is a type of attack that uses multiple compromised devices to perform the
attack?
A. Phishing
B. DDoS.
C. Pharming.
A. Software Denial.
B. Systems Detection.
C. Denial of Service.
35. Which of the following is a type of attack that uses multiple compromised devices to perform the
attack?
A. Phishing
B. DDoS.
C. Pharming.
A. Software Denial.
B. Systems Detection.
C. Denial of Service.
commands.
C. It refers to when the terminal is run with root
A. It is an open source tool that allows you to automate the process of a SQL injection attack.
A. A Web Application Firewall (WAF) protects the web application server from multiple attacks
B. A Web Application Form (WAF) protects against multiple attacks on printers
C. A Web Application Function (WAF) protects against multiple attacks on computers
TO. Windows
B. Ubuntu
C. Debian
63. Besides Kali Linux, what other operating system is used for hacking?
TO. Parrot OS
8. Hannah Montana Linux
C. Windows XP
65. What command would you use in Nmap to scan the entire network 192.168.100.1 and display the
operating system and ports?
B. The main goal of penetration testing is to find weaknesses in security before they can be exploited by
real attackers.
C. Exploiting vulnerabilities to sell information to the highest bidder
TO. Servers.
B. Wifi network.
C. People.
68. When critical vulnerabilities are detected, what action should be taken?
A. It is a technique used in cybersecurity and ethical hacking that allows an attacker to gain access to a
remote machine and control it from an external location.
B. It is a technique used in cybersecurity and ethical hacking that allows a hacker to gain access to the
WIFI network remotely and control traffic from an external location.
C. It is a technique used for port scanning.
A. They use their computer skills to steal confidential information, to infect computer systems, to restrict
access to a system
B. They use their computer skills to protect confidential information to restrict access to a system.
C. They review the facilities' wiring, provide support to users and keep track of servers in small
businesses.
A. It refers to politicians who get involved in social issues by showing their faces in the news.
B. It refers to the act of hacking a computer system for political or social purposes. A
A hacktivist breaks into a computer system, but always with the aim of influencing ideological, religious,
political or social causes.
C. They use their computer skills to steal confidential information, to infect computer systems, to restrict
access to a system
A. It is a document where passwords are stored that may possibly be the correct ones to enter the
system.
B. A common dictionary contains words and their meaning.
C. A plain text document where we normally store passwords
TO. Yeah
B. No
TO. Highs
B. Socks
C. Low
A. Yeah
B. No
Answers
40. A
1. C 41. A
2. A 42. B
3. A 43. C
4. A 44. B
5. A 45. B
6. B 46. B
7. C 47. B
8. A 48. C
9. C 49. B
10. A 50. B
11. A 51. B
12. B 52. A
13. C 53. B
14. B 54. A
15. C 55. B
16. A 56. C
17. B 57. B
18. A 58. C
19. B 59. A
20. A 60. A
21. B 61. B
22. C 62. C
23. B 63. A
24. A 64. A
25. A 65. A
26. B 66. B
27. C 67. C
28. B 68. B
29. B 69. A
30. C 70. A
31. B 71. B
32. A 72. A
33. B 73. B
34. C 74. B
35. B 75. A
36. B 76. C
37. C 77. A
38. B 78. A
39. A