CEH v12 Practice Questions (Latest 2025/
2026 Update) Qs & As | Grade A| 100%
Correct (Verified Answers)
CEH v12 Practice 485 Questions With
Correct Answer
Which of the following tools is a command-line vulnerability scanner that scans
web servers for dangerous files/CGIs?
A) Snort
B) Kon-Boot
C) John the Ripper
D) Nikto - ANSWER Nikto
Michael, a technical specialist, discovered that the laptop of one of the employees
connecting to a wireless point couldn't access the internet, but at the same time, it
can transfer files locally. He checked the IP address and the default gateway. They
are both on 192.168.1.0/24. Which of the following caused the problem?
A) The laptop is using an invalid IP address
B) The laptop and the gateway are not on the same network
C) The laptop isn't using a private IP address
D) The gateway is not routing to a public IP address - ANSWER The
gateway is not routing to a public IP address
,Josh, a security analyst, wants to choose a tool for himself to examine links
between data. One of the main requirements is to present data using graphs and
link analysis. Which of the following tools will meet John's requirements?
A) Palantir
B) Maltego
C) Analyst's Notebook
D) Metasploit - ANSWER Maltego
What describes two-factor authentication for a credit card (using a card and pin)?
A) Something you know and something you are
B) Something you have and something you know
C) Something you are and something you remember
D) Something you have and something you are - ANSWER
Something you have and something you know
Identify a vulnerability in OpenSSL that allows stealing the information protected
under normal conditions by the SSL/TLS encryption used to secure the internet?
A) SSL/TLS Renegotiation Vulnerability
B) POODLE
C) Heartbleed Bug
D) Shellshock - ANSWER Heartbleed Bug
,You make a series of interactive queries, choosing subsequent plaintexts based on
the information from the previous encryption. What type of attack are you trying to
perform?
A) Adaptive chosen-plaintext attack
B) Ciphertext-only attack
C) Known-plaintext attack
D) Chosen-plaintext attack - ANSWER Adaptive chosen-plaintext
attack
Which of the following does not apply to IPsec?
A) Provides authentication
B) Use key exchange
C) Encrypts the payloads
D) Work at the Data Link Layer - ANSWER Work at the Data Link
Layer
Alex, a cybersecurity specialist, received a task from the head to scan open ports.
One of the main conditions was to use the most reliable type of TCP scanning.
Which of the following types of scanning would Alex use?
A) NULL Scan
B) Half-open Scan
C) TCP Connect/Full Open Scan
D) Xmas Scan - ANSWER TCP Connect/Full Open Scan
, Which of the following Nmap options will you use if you want to scan fewer ports
than the default?
A) -p
B) -sP
C) -T
D) -F - ANSWER -F
You conduct an investigation and finds out that the browser of one of your
employees sent malicious request that the employee knew nothing about. Identify
the web page vulnerability that the attacker used to attack your employee?
A) Cross-Site Request Forgery (CSRF)
B) Command Injection Attacks
C) File Inclusion Attack
D) Hidden Field Manipulation Attack - ANSWER Cross-Site
Request Forgery (CSRF)
Which of the following program attack both the boot sector and executable files?
A) Stealth virus
B) Polymorphic virus
C) Macro virus
D) Multipartite virus - ANSWER Multipartite virus
Which of the following is the type of violation when an unauthorized individual
enters a building following an employee through the employee entrance?
2026 Update) Qs & As | Grade A| 100%
Correct (Verified Answers)
CEH v12 Practice 485 Questions With
Correct Answer
Which of the following tools is a command-line vulnerability scanner that scans
web servers for dangerous files/CGIs?
A) Snort
B) Kon-Boot
C) John the Ripper
D) Nikto - ANSWER Nikto
Michael, a technical specialist, discovered that the laptop of one of the employees
connecting to a wireless point couldn't access the internet, but at the same time, it
can transfer files locally. He checked the IP address and the default gateway. They
are both on 192.168.1.0/24. Which of the following caused the problem?
A) The laptop is using an invalid IP address
B) The laptop and the gateway are not on the same network
C) The laptop isn't using a private IP address
D) The gateway is not routing to a public IP address - ANSWER The
gateway is not routing to a public IP address
,Josh, a security analyst, wants to choose a tool for himself to examine links
between data. One of the main requirements is to present data using graphs and
link analysis. Which of the following tools will meet John's requirements?
A) Palantir
B) Maltego
C) Analyst's Notebook
D) Metasploit - ANSWER Maltego
What describes two-factor authentication for a credit card (using a card and pin)?
A) Something you know and something you are
B) Something you have and something you know
C) Something you are and something you remember
D) Something you have and something you are - ANSWER
Something you have and something you know
Identify a vulnerability in OpenSSL that allows stealing the information protected
under normal conditions by the SSL/TLS encryption used to secure the internet?
A) SSL/TLS Renegotiation Vulnerability
B) POODLE
C) Heartbleed Bug
D) Shellshock - ANSWER Heartbleed Bug
,You make a series of interactive queries, choosing subsequent plaintexts based on
the information from the previous encryption. What type of attack are you trying to
perform?
A) Adaptive chosen-plaintext attack
B) Ciphertext-only attack
C) Known-plaintext attack
D) Chosen-plaintext attack - ANSWER Adaptive chosen-plaintext
attack
Which of the following does not apply to IPsec?
A) Provides authentication
B) Use key exchange
C) Encrypts the payloads
D) Work at the Data Link Layer - ANSWER Work at the Data Link
Layer
Alex, a cybersecurity specialist, received a task from the head to scan open ports.
One of the main conditions was to use the most reliable type of TCP scanning.
Which of the following types of scanning would Alex use?
A) NULL Scan
B) Half-open Scan
C) TCP Connect/Full Open Scan
D) Xmas Scan - ANSWER TCP Connect/Full Open Scan
, Which of the following Nmap options will you use if you want to scan fewer ports
than the default?
A) -p
B) -sP
C) -T
D) -F - ANSWER -F
You conduct an investigation and finds out that the browser of one of your
employees sent malicious request that the employee knew nothing about. Identify
the web page vulnerability that the attacker used to attack your employee?
A) Cross-Site Request Forgery (CSRF)
B) Command Injection Attacks
C) File Inclusion Attack
D) Hidden Field Manipulation Attack - ANSWER Cross-Site
Request Forgery (CSRF)
Which of the following program attack both the boot sector and executable files?
A) Stealth virus
B) Polymorphic virus
C) Macro virus
D) Multipartite virus - ANSWER Multipartite virus
Which of the following is the type of violation when an unauthorized individual
enters a building following an employee through the employee entrance?