100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CERTIFIED ETHICAL HACKER (CEH) EXAMINATION QUESTION AND CORRECT ANSWERS (VERIFIED ANSWERS) PLUS RATIONALES 2026 Q&A INSTANT DOWNLOAD PDF

Rating
-
Sold
-
Pages
30
Grade
A+
Uploaded on
17-12-2025
Written in
2025/2026

CERTIFIED ETHICAL HACKER (CEH) EXAMINATION QUESTION AND CORRECT ANSWERS (VERIFIED ANSWERS) PLUS RATIONALES 2026 Q&A INSTANT DOWNLOAD PDF

Institution
CERTIFIED ETHICAL HACKER
Course
CERTIFIED ETHICAL HACKER










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CERTIFIED ETHICAL HACKER
Course
CERTIFIED ETHICAL HACKER

Document information

Uploaded on
December 17, 2025
Number of pages
30
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CERTIFIED ETHICAL HACKER (CEH)
EXAMINATION QUESTION AND
CORRECT ANSWERS (VERIFIED
ANSWERS) PLUS RATIONALES 2026 Q&A
INSTANT DOWNLOAD PDF

1. Which phase of ethical hacking involves gathering information without
directly interacting with the target system?
A. Scanning
B. Enumeration
C. Exploitation
D. Footprinting
Answer: D
Rationale: Footprinting is the passive information-gathering phase where
attackers collect data from public sources without touching the target directly.


2. What type of hacker is employed by organizations to test security defenses
legally?
A. Black hat
B. Grey hat
C. Script kiddie
D. White hat
Answer: D
Rationale: White hat hackers are authorized professionals who conduct ethical
hacking to improve security.

, 3. Which tool is commonly used for network packet analysis?
A. Nmap
B. Metasploit
C. Wireshark
D. Nessus
Answer: C
Rationale: Wireshark captures and analyzes network packets to inspect traffic
and troubleshoot issues.


4. What does Nmap primarily help identify?
A. Password hashes
B. Open ports and services
C. Malware signatures
D. File permissions
Answer: B
Rationale: Nmap is a network scanner used to discover hosts, open ports, and
running services.


5. Which attack involves sending excessive requests to exhaust system
resources?
A. SQL injection
B. Phishing
C. Denial-of-Service
D. Sniffing
Answer: C
Rationale: DoS attacks overwhelm resources, making systems unavailable to
legitimate users.

, 6. What protocol is used to securely transfer files over SSH?
A. FTP
B. TFTP
C. SCP
D. HTTP
Answer: C
Rationale: SCP (Secure Copy Protocol) uses SSH to securely transfer files.


7. Which technique maps out user accounts and network resources?
A. Footprinting
B. Scanning
C. Enumeration
D. Exploitation
Answer: C
Rationale: Enumeration extracts detailed information such as users, groups, and
shares.


8. Which attack targets weaknesses in web application databases?
A. Cross-site scripting
B. SQL injection
C. Session hijacking
D. ARP poisoning
Answer: B
Rationale: SQL injection exploits poor input validation to manipulate backend
databases.


9. What is the primary goal of penetration testing?
A. Cause damage
B. Steal data
$16.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
alexmwangi1314

Get to know the seller

Seller avatar
alexmwangi1314 Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
New on Stuvia
Member since
2 weeks
Number of followers
0
Documents
466
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions