CEH v12 Practice Test (Latest 2025/ 2026
Update) Qs & As | Grade A| 100% Correct
(Verified Answers)
How is the public is key distributed in an orderly, controlled fashion so that the
users can be sure
of the sender's identity?
A. Hash value
B. Digital signature
C. Private key
D. Digital certificate - ANSWER D. Digital certificate
What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common?
A. All are tools that can be used not only by hackers, but also security personnel
B. All are hacking tools developed by the legion of doom
C. All are tools that are only effective against Windows D. All are tools that are
only effective against Linux
E. All are DDOS tools - ANSWER E. All are DDOS tools
A zone file consists of which of the following Resource Records (RRs)?
A. DNS, NS, PTR, and MX records
B. SOA, NS, A, and MX records
C. DNS, NS, AXFR, and MX records
D. SOA, NS, AXFR, and MX records - ANSWER B. SOA, NS, A, and
MX records
, Which of the following is the primary objective of a rootkit?
A. It creates a buffer overflow
B. It provides an undocumented opening in a program
C. It replaces legitimate programs
D. It opens a port to provide an unauthorized service - ANSWER C. It
replaces legitimate programs
CompanyXYZ has asked you to assess the security of their perimeter email
gateway. From your office in New York, you craft a specially formatted email
message and send it across the Internet to an employee of CompanyXYZ. The
employee of CompanyXYZ is aware of your test.
Your email message looks like this:
From:
To: Subject: Test message
Date: 4/3/2017 14:37
The employee of CompanyXYZ receives your email message. This proves that
CompanyXYZ's email gateway doesn't prevent what?
A. Email Harvesting
B. Email Masquerading
C. Email Phishing
D. Email Spoofing - ANSWER D. Email Spoofing
When discussing passwords, what is considered a brute force attack?
A. You wait until the password expires
B. You create hashes of a large number of words and compare it with the
encrypted passwords
Update) Qs & As | Grade A| 100% Correct
(Verified Answers)
How is the public is key distributed in an orderly, controlled fashion so that the
users can be sure
of the sender's identity?
A. Hash value
B. Digital signature
C. Private key
D. Digital certificate - ANSWER D. Digital certificate
What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common?
A. All are tools that can be used not only by hackers, but also security personnel
B. All are hacking tools developed by the legion of doom
C. All are tools that are only effective against Windows D. All are tools that are
only effective against Linux
E. All are DDOS tools - ANSWER E. All are DDOS tools
A zone file consists of which of the following Resource Records (RRs)?
A. DNS, NS, PTR, and MX records
B. SOA, NS, A, and MX records
C. DNS, NS, AXFR, and MX records
D. SOA, NS, AXFR, and MX records - ANSWER B. SOA, NS, A, and
MX records
, Which of the following is the primary objective of a rootkit?
A. It creates a buffer overflow
B. It provides an undocumented opening in a program
C. It replaces legitimate programs
D. It opens a port to provide an unauthorized service - ANSWER C. It
replaces legitimate programs
CompanyXYZ has asked you to assess the security of their perimeter email
gateway. From your office in New York, you craft a specially formatted email
message and send it across the Internet to an employee of CompanyXYZ. The
employee of CompanyXYZ is aware of your test.
Your email message looks like this:
From:
To: Subject: Test message
Date: 4/3/2017 14:37
The employee of CompanyXYZ receives your email message. This proves that
CompanyXYZ's email gateway doesn't prevent what?
A. Email Harvesting
B. Email Masquerading
C. Email Phishing
D. Email Spoofing - ANSWER D. Email Spoofing
When discussing passwords, what is considered a brute force attack?
A. You wait until the password expires
B. You create hashes of a large number of words and compare it with the
encrypted passwords