PM
CEH V12 EXAM QUESTIONS AND ANSWERS WITH COMPLETE
SOLUTIONS VERIFIED GRADED A++ LATEST UPDATE 2025/2026
Terms in this set (366)
What is the 1st Reconnaissance 3 multiple choice
phase of the Cyber options
Kill Chain?
Which of the ICMP Type 11
messages are used by
most traceroute
programs to determine
the IP addresses of
intermediate routers?
What is the goal of To gather as much information about the network as
enumeration? possible
The type of scan that is Idle Scan
when the source
address is spoofed to
the target but
requires a zombie.
Scan that goes through Listing Scan
IP address ranges
provided by user
Unique scan that only NULL Scan
works on UNIX and
Linux where no is a
1/
12
, 6/28/25, 2:02
PM
sign of an open port.
Which information may Hostnames and IP addresses
be gathered using
nslookup?
Adversary behavior Automation tool to transfer data
Powershell
Adversary behavior Gain access to read files or their contents
Command line
Adversary behavior CNC Communicate remotely to the system
Servers
Adversary behavior DNS Hide malicious traffic
tunneling
What is the goal of ethical To detect security flaws before they are exploited by
hacking? attackers
What does covering your Concealing Activity
tracks mean?
2/
12