100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CEH v12 EXAM QUESTIONS WITH ANSWERS

Rating
-
Sold
-
Pages
23
Grade
A+
Uploaded on
05-07-2025
Written in
2024/2025

CEH v12 EXAM QUESTIONS WITH ANSWERS

Institution
CEH V12
Course
CEH v12










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CEH v12
Course
CEH v12

Document information

Uploaded on
July 5, 2025
Number of pages
23
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CEH v12 EXAM QUESTIONS WITH
|\ |\ |\ |\ |\




ANSWERS

Which of the following modbus-cli commands is used by
|\ |\ |\ |\ |\ |\ |\ |\ |\


attackers to manipulate the register values in a target PLC
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


device?


A. modbus write <Target IP> 101 1 1 1 1 1 1 1 1 1 1 modbus
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


write <Target IP> %M100 1 1 1 1 1 1 1 1 1 1
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\




B. modbus write <Target IP> %MW100 2 2 2 2 2 2 2 2 modbus
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


write <Target IP> 400101 2 2 2 2 2 2 2 2
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\




C. modbus read <Target IP> 101 10 modbus read <Target IP>
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


%M100 10 |\




D. modbus read <Target IP> 101 10 modbus read <Target IP>
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


%M100 10 - CORRECT ANSWERS ✔✔B
|\ |\ |\ |\ |\




In which of the following security risks does an API accidentally
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


expose internal variables or objects because of improper binding
|\ |\ |\ |\ |\ |\ |\ |\ |\


and filtering based on a whitelist, allowing attackers with
|\ |\ |\ |\ |\ |\ |\ |\ |\


unauthorized access to modify object properties? |\ |\ |\ |\ |\




A. Broken object-level authorization
|\ |\ |\




B. Broken object-level authorization
|\ |\ |\




C. Broken object-level authorization
|\ |\ |\




D. Injection - CORRECT ANSWERS ✔✔B
|\ |\ |\ |\ |\

,Identify the type of cluster computing in which work is distributed
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


among nodes to avoid overstressing a single node and periodic
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


health checks are performed on each node to identify node
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


failures and reroute the incoming traffic to another node.
|\ |\ |\ |\ |\ |\ |\ |\




A.Fail-over
B.Load balancing |\




C.Highly available |\




D.High-performance computing - CORRECT ANSWERS ✔✔B |\ |\ |\ |\ |\




Which of the following is an attack technique where the only
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


information available to the attacker is some plaintext blocks
|\ |\ |\ |\ |\ |\ |\ |\ |\


along with the corresponding ciphertext and algorithm used to
|\ |\ |\ |\ |\ |\ |\ |\ |\


encrypt and decrypt the text? |\ |\ |\ |\




A. Ciphertext-only attack
|\ |\




B. Adaptive chosen-plaintext attack
|\ |\ |\




C. Chosen-plaintext attack
|\ |\




D. Known-plaintext attack - CORRECT ANSWERS ✔✔A.
|\ |\ |\ |\ |\ |\




Which of the following communication protocols is a variant of
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


the Wi-Fi standard that provides an extended range, making it
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


useful for communications in rural areas, and offers low data
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


rates?
A. HaLow
|\




B. Z-Wave
|\




C. 6LoWPAN
|\

, D. QUIC - CORRECT ANSWERS ✔✔C
|\ |\ |\ |\ |\




Which of the following is a technique used by an attacker to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


gather valuable system-level data such as account details, OS,
|\ |\ |\ |\ |\ |\ |\ |\ |\


software version, server names, and database schema details?
|\ |\ |\ |\ |\ |\ |\ |\




A.Whois
B.Session hijacking |\




C.Web server footprinting |\ |\




D.Vulnerability scanning - CORRECT ANSWERS ✔✔C |\ |\ |\ |\ |\




Which of the following RFCrack commands is used by an attacker
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


to perform an incremental scan on a target IoT device while
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


launching a rolling-code attack? |\ |\ |\




A.python RFCrack.py -b -v 5000000 |\ |\ |\ |\




B.python RFCrack.py-j -F 314000000 |\ |\ |\




C.python RFCrack.py -r -M MOD_2FSK -F 314350000
|\ |\ |\ |\ |\ |\




D.python RFCrack.py -i - CORRECT ANSWERS ✔✔A |\ |\ |\ |\ |\ |\




Clark, a professional hacker, was attempting to capture packet
|\ |\ |\ |\ |\ |\ |\ |\ |\


flow on a target organization's network. After exploiting certain
|\ |\ |\ |\ |\ |\ |\ |\ |\


vulnerabilities in the network, Clark placed his Raspberry Pi |\ |\ |\ |\ |\ |\ |\ |\ |\


device between the server and an authorized device to make all
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


the network traffic pass through his device so that he can easily
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


sniff and monitor the packet flow. Using this technique, Clark
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EXAMSTUDYPLUG Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
299
Member since
3 year
Number of followers
106
Documents
17673
Last sold
1 week ago
GRADE BUDDY

Welcome to My Page! Are you looking for high-quality study resources to ace your exams or better understand your coursework? You've come to the right place! I'm passionate about sharing my knowledge and helping students succeed academically. Here, you'll find a wide range of well-organized notes, study guides, and helpful materials across various subjects, including Maths ,nursig, Biology, History, etc.. Each resource is carefully crafted with detailed explanations, clear examples, and relevant key points to help simplify complex concepts. Whether you're preparing for a test, reviewing lectures, or need extra support, my resources are designed to make your learning experience smoother and more effective. Let me be a part of your academic journey, and feel free to reach out if you have any questions or need personalized assistance!

Read more Read less
4.5

230 reviews

5
155
4
50
3
13
2
5
1
7

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions