PM
CEH V10 QUESTIONS EXAM QUESTIONS AND ANSWERS WITH
COMPLETE SOLUTIONS VERIFIED GRADED A++ LATEST UPDATE
2025/2026
Terms in this set (225)
Hacker is a person who b. Individuals with extraordinary skills, resorting to
illegally breaks into a malicious or destructive activities and are also known
system or network without as crackers.
any authorization to
destroy, steal sensitive
data or to perform any
malicious attacks. Black
Hat hackers are:
a. Individuals professing
hacker skills and using
them for defensive
purposes and are also
known as security
analysts
b. Individuals with
extraordinary skills,
resorting to malicious
or destructive
activities and are also known
as crackers.
c. Individual to aim to bring
down critical
infrastructure for a
1/63
,6/28/25, 2:04
PM
"cause" and are not
worried about facing 30
years in jail for
their actions.
d. Individuals who work
both offensively and
defensively at various
times.
2/63
,6/28/25, 2:04
PM
In order to compromise or to a. Reconnaissance
hack a system or network
the hacker go through
various phases of
hacking.What is the first
hacking phase that
hackers perform to gather
information about a target
prior to launching an
attack?
a. Reconnaissance
b. Scanning
c. Gaining access
d. Maintaining Access
e. Clearing tracks
Defense-in-depth is a a. True
security strategy in which
several protection layers are
placed throughout an
information system. It helps
to prevent direct attacks
against an
information system and data
because a
break in one layer only
leads the attacker to the
next layers.
3/63
, 6/28/25, 2:04
PM
a.True
b. False
Penetration testing is a b. Black Box pen testing
method of actively
evaluating the security of
an information system f
network by simulation an
attack
from a malicious
source.Which of the
following techniques is used
to simulate an attack from
someone who is unfamiliar
with the system?
a. White box pen testing
b. Black Box pen testing
c. Grey box pen testing
d. Announced pen testing
Which of the following c. Stealth scanning technique
scanning techniques do
attackers use to bypass
firewall rules,
logging mechanism, and
hide themselves as usual
network traffic?
a.TCP connect scanning
4/63