In the ever-evolving landscape of cybersecurity, the role of Certified Ethical Hackers (CEH) has become increasingly crucial. These professionals are tasked with identifying and exploiting vulnerabilities in computer systems, networks, and applications, all with the goal of fortifying digital defenses against malicious hackers.
Achieving the CEH certification requires a deep understanding of various hacking techniques, tools, and methodologies. One effective way to prepare for the CEH exam is through practice test questions, which simulate real-world scenarios and assess your knowledge and skills.
Explore the world of malware threats and defenses in this set. Test your ability to recognize and mitigate different types of malware, ensuring you are well-prepared to safeguard systems from malicious software.
- Certified Ethical Hacker v12 – Practice Test Questions – Part 1
- Certified Ethical Hacker v12 – Practice Test Questions – Part 2
- Certified Ethical Hacker v12 – Practice Test Questions – Part 3
- Certified Ethical Hacker v12 – Practice Test Questions – Part 4
- Certified Ethical Hacker v12 – Practice Test Questions – Part 5
- Certified Ethical Hacker v12 – Practice Test Questions – Part 6
- Certified Ethical Hacker v12 – Practice Test Questions – Part 7
- Certified Ethical Hacker v12 – Practice Test Questions – Part 8
- Certified Ethical Hacker v12 – Practice Test Questions – Part 9
- Certified Ethical Hacker v12 – Practice Test Questions – Part 10
- Certified Ethical Hacker v12 – Practice Test Questions – Part 11
- Certified Ethical Hacker v12 – Practice Test Questions – Part 12
- Certified Ethical Hacker v12 – Practice Test Questions – Part 13
- Certified Ethical Hacker v12 – Practice Test Questions – Part 14
1Q: John is setting up security on his website, an e-commerce site. He wants to be sure that any customer sending messages is really the customer he claims to be. Which of the below methods can John take he use to certify this?
a. Packet filtering
b. Firewall
c. Digital signature
d. Authentication
Solution: The correct answer is C.
2Q: In which of the below techniques does an attacker capture encrypted messages that have been encrypted using an identical encryption algorithm?
a. Chosen plaintext attack
b. Chosen ciphertext attack
c. Known plaintext attack
d. Ciphertext only attack
Solution: The correct answer is D.
3Q: Which of the below techniques cannot be used to perform active OS fingerprinting? (Select more than one answer if applicable.)
a. Sniffing and analyzing packets
b. ICMP error message quoting
c. Sending FIN packets to open ports on a remote system.
d. Analyzing the email headers.
Solution: Answers A and D are correct.
4Q: Which of the below types of privacy invasion involves modifying data or information before or during input into a computer system with the intent to steal or commit fraud?
a. Spoofing
b. Wiretapping
c. Eavesdropping
d. Data diddling
Solution: The correct answer is D.
5Q: Which of the below will record everything a user types using a keyboard connected to the machine it is installed within?
a. Firewall
b. Port scanner
c. Keystroke logger
d. Line conditioner
Solution: The correct answer is C.
6Q: From the below list, which, if any, of these tools can be used to obscure identity? (Select more than one answer if applicable.)
a. War dialer
b. Proxy server
c. IPChains
d. Anonymizer
e. Rootkit
Solution: Answers B, C, and D are correct.
7Q: Which of the below tools can be used for footprinting? (Select more than one answer if applicable.)
a. Brutus
b. Sam spade
c. Traceroute
d. Whois
Solution: The correct answers are B, C, and D.
8Q: Alex works as an Ethical Hacker. His main project is to test the security of his client’s website. He starts by performing footprinting and scanning. What does this entail? (Select more than one answer if applicable.)
a. Information-gathering
b. Determining the network range
c. Identifying all active machines
d. Finding any open ports and/or applications
e. Enumeration through a four-step process
Solution: Of the above choices, A, B, C, and D are correct.
9Q: Which of the below techniques uses a modem in order to automatically scan a list of telephone numbers?
a. War dialing
b. Warkitting
c. Warchalking
d. War driving
Solution: The correct answer is A.
10Q: As Database Manager for a local company, John has a lot of responsibilities. He decides to set up remote control software on his work machine so that he will be able to login from home or otherwise. After installing the connection, he connects a modem to an otherwise-unused fax line. With no authentication to enable him to set a password for a host connection to the remote connection, John’s remote connection will be accessible to for anyone to connect to his host system. Which of the below attacks can be performed on John’s remote connection?
a. War dialing
b. Zero-day
c. War driving
d. Warchalking
Solution: The correct answer is A.
11Q: Which of the below is a passive, non-direct information-gathering tool?
a. Ettercap
b. Whois
c. Nmap
d. Snort
Solution: The correct answer is B.
12Q: Determining which services are active on a target machine as well as possible entry points to attack, which of the below would you use?
a. Nmap scan
b. Ping
c. Traceroute
d. Banner grabbing
Solution: The correct answer is A.
13Q: Chuck needs to perform a basic vulnerability scan using NMAP. When dealing with protocols like FTP and HTTP, what key engine does NMAP utilize?
a. SAINT
b. Metasploit
c. NESSUS
d. NMAP
Solution: The correct answer is D.
14Q: While running an nmap scan for filtered ports, you send an ACK flag and receive a RST packet for open and closed ports. What kind of nmap scan did you run?
a. Null Scan -sN
b. Fin Scan -sF
c. XMAS Scan -sX
d. TCP ACK scan -sA
Solution: The correct answer is D.
15Q: Which of the below Nmap commands is used to perform a UDP port scan?
a. nmap -sU
b. nmap -sS
c. nmap -sF
d. nmap -sN
Solution: The correct answer is A.
16Q: Which nmap switch would you use to retrieve as many different protocols as possible that are being used by a remote host?
a. nmap -sO
b. nmap -sS
c. nmap -sT
d. nmap -vO
17Q: Which of the below represents the type of packet inspection used by a firewall when scanning the DMZ interface on a firewall Nmap reports that port 80 is unfiltered?
a. Deep
b. Stateless
c. Proxy
d. Stateful
Solution: The correct answer is B.
18Q: As a contracted Ethical Hacker, John has recently contracted to complete a project to do security checking on a website. He wants to find out which operating system is used by the web server. Which of the below commands can he use to complete this task? Each correct answer represents a complete solution. Choose two.
a. nmap -v -O 208. 100. 2. 25
b. nc -v -n 208. 100. 2. 25 80
c. nc 208. 100. 2. 25 23
d. nmap -v -O [www.website.com]
Solution: The correct answers are A and D.
19Q: Which of the below Nmap switches can be utilized to perform TCP/IP stack fingerprinting?
a. nmap -O -p
b. nmap -sU -p
c. nmap -sS
d. nmap -sT
Solution: The correct answer is A.
20Q: Which of the below kinds of machines do security teams often use for attracting potential intruders?
a. Bastion host
b. Data pot
c. Files pot
d. Honeypot
Solution: The correct answer is D.
21Q: Which of the below are password-cracking utilities? (Choose 3)
a. NMAP
b. John the Ripper
c. Cain and Abel
d. KerbCrack
e. Wireshark
f. WebGoat
Solution: The correct answers are A, B and D.
22Q: Which of the below utilities is a protocol analyzer with the ability to capture packet traffic as it comes into the network (“in real time”)?
a. NetWitness
b. Netresident
c. Snort
d. Wireshark
Solution: The correct answer is D.
23Q: Wireshark will excel in which one of the below situations you might face as an Ethical Hacker?
a. If you need to target networks using switches or so-called “full-duplex” hubs (which are actually switches).
b. If you need to target networks utilizing repeaters/hubs.
c. If your target is a Windows-based network.
d. If your target is a Linux-based network.
Solution: The correct answer is A.
24Q: You need to obtain a packet capture for a network. Which of the below devices would allow you to capture a total picture of the traffic on the wire through Wireshark?
a. Network tap
b. Layer 3 switch
c. Network bridge
d. Router
Solution: The correct answer is B.
You may also like:- 260 One-Liner Information Security Questions and Answers for Fast Learning
- Top 20 HTML5 Interview Questions with Answers
- 80 Most Important Network Fundamentals Questions With Answers
- 100 Most Important SOC Analyst Interview Questions
- Top 40 Cyber Security Questions and Answers
- Top 10 React JS Interview Theory Questions and Answers
- CISSP – Practice Test Questions – 2024 – Set 20 (53 Questions)
- Part 2: Exploring Deeper into CCNA – Wireless (145 Practice Test Questions)
- Part 1: Mastering CCNA – Wireless (145 Practice Test Questions)
- [1z0-1085-20] Oracle Cloud Infrastructure Foundations 2020 Associate MCQ Questions – Part 3