CEH V12 Exams (Latest 2024/ 2025 Updates STUDY
BUNDLE PACKAGE WITH SOLUTIONS) Qs & As | Grade
A| 100% Correct (Verified Answers)
What is the phases of the Cyber Kill Chain - ANSWERRecon, Weaponization, Delivery,
Exploitation, Install, CNC & Action
Which of the ICMP messages are used by most traceroute programs to determine
the IP addresses of intermediate routers? - ANSWERType 11
What is the goal of enumeration? - ANSWERTo gather as much information about
the network as possible
The type of scan that is when the source address is spoofed to the target but
requires a zombie. - ANSWERIdle Scan
Scan that goes through IP address ranges provided by user - ANSWERListing Scan
Unique scan that only works on UNIX and Linux where no is a sign of an open port. -
ANSWERNULL Scan
Which information may be gathered using nslookup? - ANSWERHostnames and IP
addresses
Adversary behavior Powershell - ANSWERAutomation tool to transfer data
Adversary behavior Command line - ANSWERGain access to read files or their
contents
Adversary behavior CNC Servers - ANSWERCommunicate remotely to the system
Adversary behavior DNS tunneling - ANSWERHide malicious traffic
What is the goal of ethical hacking? - ANSWERTo detect security flaws before they
are exploited by attackers
What does covering your tracks mean? - ANSWERConcealing Activity
What is the name of a set of software tools that allows an attacker to access a target
remotely and remain hidden. - ANSWERA rootkit
Which of the following attacks is considered hard to detect? - ANSWERPassive
What standard specifies the requirements for implementing, maintaining,
establishing and continually improving systems. - ANSWERIEC 2701 and 2013
, Protects the public and investors with accurate and reliably corporate disclosures. -
ANSWERSarbanes-Oxley (SOX) Act
Global level privacy and security laws? - ANSWERGeneral Data Protection Regulation
(GDPR)
Two different treaties that guard against copyright infringement. - ANSWERDigital
Millennium Copyright Act
What is Extension walking? - ANSWERUse of Google operators to change the file
types
Which of the ICMP messages are for destination unreachable messages? -
ANSWERType 3
Most accurate description of footprinting? - ANSWERInvestigating a target
nslookup - ANSWERFind IP addresses associated with domain name
What is the purpose of reconnaissance? - ANSWERTo avoid detection while
gathering data on a target for potential vulnerable
Information on web server's OS - ANSWERNetCraft
Nmap Command for scanning disable port scanning. - ANSWER-sn
When trying to obtain employee names and addresses, what is the best source to
use? - ANSWERWHOIS
Which of the ICMP messages are for redirection a message. - ANSWERType 5
Nmap Command for TCP SYN port scan - ANSWER-sS
Path packet takes to the target IP address - ANSWERTracet or Traceroute
Nmap Command for TCP connect port scan - ANSWER-sT
Used to gather information on target website - ANSWERWHOIS
Following reconnaissance, what's the next step to accomplished? - ANSWERScanning
Stealth scan that sends RST rather than SYN/ACK for three way handshake. -
ANSWERHalf-Open Scan
Nmap Command for scanning listed targets only. - ANSWER-sT
DNS Port - ANSWER53
BUNDLE PACKAGE WITH SOLUTIONS) Qs & As | Grade
A| 100% Correct (Verified Answers)
What is the phases of the Cyber Kill Chain - ANSWERRecon, Weaponization, Delivery,
Exploitation, Install, CNC & Action
Which of the ICMP messages are used by most traceroute programs to determine
the IP addresses of intermediate routers? - ANSWERType 11
What is the goal of enumeration? - ANSWERTo gather as much information about
the network as possible
The type of scan that is when the source address is spoofed to the target but
requires a zombie. - ANSWERIdle Scan
Scan that goes through IP address ranges provided by user - ANSWERListing Scan
Unique scan that only works on UNIX and Linux where no is a sign of an open port. -
ANSWERNULL Scan
Which information may be gathered using nslookup? - ANSWERHostnames and IP
addresses
Adversary behavior Powershell - ANSWERAutomation tool to transfer data
Adversary behavior Command line - ANSWERGain access to read files or their
contents
Adversary behavior CNC Servers - ANSWERCommunicate remotely to the system
Adversary behavior DNS tunneling - ANSWERHide malicious traffic
What is the goal of ethical hacking? - ANSWERTo detect security flaws before they
are exploited by attackers
What does covering your tracks mean? - ANSWERConcealing Activity
What is the name of a set of software tools that allows an attacker to access a target
remotely and remain hidden. - ANSWERA rootkit
Which of the following attacks is considered hard to detect? - ANSWERPassive
What standard specifies the requirements for implementing, maintaining,
establishing and continually improving systems. - ANSWERIEC 2701 and 2013
, Protects the public and investors with accurate and reliably corporate disclosures. -
ANSWERSarbanes-Oxley (SOX) Act
Global level privacy and security laws? - ANSWERGeneral Data Protection Regulation
(GDPR)
Two different treaties that guard against copyright infringement. - ANSWERDigital
Millennium Copyright Act
What is Extension walking? - ANSWERUse of Google operators to change the file
types
Which of the ICMP messages are for destination unreachable messages? -
ANSWERType 3
Most accurate description of footprinting? - ANSWERInvestigating a target
nslookup - ANSWERFind IP addresses associated with domain name
What is the purpose of reconnaissance? - ANSWERTo avoid detection while
gathering data on a target for potential vulnerable
Information on web server's OS - ANSWERNetCraft
Nmap Command for scanning disable port scanning. - ANSWER-sn
When trying to obtain employee names and addresses, what is the best source to
use? - ANSWERWHOIS
Which of the ICMP messages are for redirection a message. - ANSWERType 5
Nmap Command for TCP SYN port scan - ANSWER-sS
Path packet takes to the target IP address - ANSWERTracet or Traceroute
Nmap Command for TCP connect port scan - ANSWER-sT
Used to gather information on target website - ANSWERWHOIS
Following reconnaissance, what's the next step to accomplished? - ANSWERScanning
Stealth scan that sends RST rather than SYN/ACK for three way handshake. -
ANSWERHalf-Open Scan
Nmap Command for scanning listed targets only. - ANSWER-sT
DNS Port - ANSWER53