100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CEH v12 Exam with verified solutions

Rating
-
Sold
-
Pages
23
Grade
A+
Uploaded on
29-06-2025
Written in
2024/2025

CEH v12 Exam with verified solutions

Institution
CEH V12
Course
CEH V12










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CEH V12
Course
CEH V12

Document information

Uploaded on
June 29, 2025
Number of pages
23
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CEH v12 Exam w ith ver ifi ed solution s |! |! |! |! |!




Which of the following modbus-cli commands is used by attackers to
|! |! |! |! |! |! |! |! |! |! |!




manipulate the register values in a target PLC device? |! |! |! |! |! |! |! |!




A. modbus write <Target IP> 101 1 1 1 1 1 1 1 1 1 1 modbus write <Target
|! |! |! |! |! |! |! |! |! |! |! |! |! |! |! |! |! |! |!




IP> %M100 1 1 1 1 1 1 1 1 1 1
|! |! |! |! |! |! |! |! |! |! |!




B. modbus write <Target IP> %MW100 2 2 2 2 2 2 2 2 modbus write <Target
|! |! |! |! |! |! |! |! |! |! |! |! |! |! |! |! |!




IP> 400101 2 2 2 2 2 2 2 2
|! |! |! |! |! |! |! |! |!




C. modbus read <Target IP> 101 10 modbus read <Target IP> %M100 10
|! |! |! |! |! |! |! |! |! |! |! |!




D. modbus read <Target IP> 101 10 modbus read <Target IP> %M100 10 -
|! |! |! |! |! |! |! |! |! |! |! |! |! |!




Correct answer ✔B |! |!




In which of the following security risks does an API accidentally expose
|! |! |! |! |! |! |! |! |! |! |! |!




internal variables or objects because of improper binding and filtering based
|! |! |! |! |! |! |! |! |! |! |!




on a whitelist, allowing attackers with unauthorized access to modify object
|! |! |! |! |! |! |! |! |! |! |!




properties?



A. Broken object-level authorization
|! |! |!




B. Broken object-level authorization
|! |! |!




C. Broken object-level authorization
|! |! |!




D. Injection - Correct answer ✔B
|! |! |! |! |!

,Identify the type of cluster computing in which work is distributed among
|! |! |! |! |! |! |! |! |! |! |! |!




nodes to avoid overstressing a single node and periodic health checks are
|! |! |! |! |! |! |! |! |! |! |! |!




performed on each node to identify node failures and reroute the incoming
|! |! |! |! |! |! |! |! |! |! |! |!




traffic to another node.
|! |! |!




A.Fail-over

B.Load balancing
|!




C.Highly available |!




D.High-performance computing - Correct answer ✔B |! |! |! |! |!




Which of the following is an attack technique where the only information
|! |! |! |! |! |! |! |! |! |! |! |!




available to the attacker is some plaintext blocks along with the
|! |! |! |! |! |! |! |! |! |! |!




corresponding ciphertext and algorithm used to encrypt and decrypt the text?
|! |! |! |! |! |! |! |! |! |!




A. Ciphertext-only attack
|! |!




B. Adaptive chosen-plaintext attack
|! |! |!




C. Chosen-plaintext attack
|! |!




D. Known-plaintext attack - Correct answer ✔A.
|! |! |! |! |! |!




Which of the following communication protocols is a variant of the Wi-Fi
|! |! |! |! |! |! |! |! |! |! |! |!




standard that provides an extended range, making it useful for
|! |! |! |! |! |! |! |! |! |!




communications in rural areas, and offers low data rates? |! |! |! |! |! |! |! |!




A. HaLow
|!




B. Z-Wave
|!




C. 6LoWPAN
|!

, D. QUIC - Correct answer ✔C
|! |! |! |! |!




Which of the following is a technique used by an attacker to gather valuable
|! |! |! |! |! |! |! |! |! |! |! |! |! |!




system-level data such as account details, OS, software version, server names,
|! |! |! |! |! |! |! |! |! |! |!




and database schema details?
|! |! |! |!




A.Whois

B.Session hijacking |!




C.Web server footprinting |! |!




D.Vulnerability scanning - Correct answer ✔C |! |! |! |! |!




Which of the following RFCrack commands is used by an attacker to perform
|! |! |! |! |! |! |! |! |! |! |! |!




an incremental scan on a target IoT device while launching a rolling-code
|! |! |! |! |! |! |! |! |! |! |! |! |!




attack?



A.python RFCrack.py -b -v 5000000 |! |! |! |!




B.python RFCrack.py-j -F 314000000 |! |! |!




C.python RFCrack.py -r -M MOD_2FSK -F 314350000 |! |! |! |! |! |!




D.python RFCrack.py -i - Correct answer ✔A |! |! |! |! |! |!




Clark, a professional hacker, was attempting to capture packet flow on a
|! |! |! |! |! |! |! |! |! |! |! |!




target organization's network. After exploiting certain vulnerabilities in the
|! |! |! |! |! |! |! |! |!




network, Clark placed his Raspberry Pi device between the server and an
|! |! |! |! |! |! |! |! |! |! |! |!




authorized device to make all the network traffic pass through his device so
|! |! |! |! |! |! |! |! |! |! |! |! |!




that he can easily sniff and monitor the packet flow. Using this technique,
|! |! |! |! |! |! |! |! |! |! |! |! |!




Clark successfully bypassed NAC controls connected to the target network.
|! |! |! |! |! |! |! |! |!

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Ruiz Liberty University
View profile
Follow You need to be logged in order to follow users or courses
Sold
74
Member since
1 year
Number of followers
2
Documents
11341
Last sold
6 days ago
Top-Quality Study Materials for Success – Ace Your Exams with Expert Resources!

Access high-quality study materials to help you excel in your exams. Get notes, summaries, and guides tailored to your courses!

3.3

7 reviews

5
3
4
0
3
2
2
0
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions