g
1. A Certified Ethical Hacker follows a specific boundaries,
method- ology for testing a system. Which nondisclo-
step comes after footprinting in the CEH sure
methodology? agreements,
and a
2. You've been hired as part of a pen test team. completion
During the in brief, you learn the client wants date
the pen test attack to simulate a normal user definition.
who finds ways to elevate privileges and Which of the
create attacks. Which test type does the client following
want? statements
are true?
3. Which of the following is true regarding
an ethical hacker?
4. You begin your first pen-test assignment by
checking out IP address ranges owned by the
target as well as details of their domain name
registration. Additional- ly, you visit job boards
and financial websites to gather any technical
information online. What activity are you
performing?
5. You send a message across a network and are
pri- marily concerned that it is not altered
during transit. Which security element ensures
a message arrives at its destination with no
alteration?
6. An ethical hacker is given no prior knowledge
of the network and has a specific framework in
which to work. The agreement specifies
1/
52
, CEH Practice Exam Questions Correctly Answered.
g
Scanning
Gray box
Integrity
The ethical hacker has authorization to proceed from the target owner. A white hat is
attempting a black box
Passive footprinting
test.
7. Bit flipping
2/
52
, CEH Practice Exam
Questions
Which of the following attacks is considered an
in- tegrity attack, where the attacker is not
concerned with deciphering the entirety of a
plaintext message?
8. As part of a pen test on a U.S. Government system, you Privacy Act
discover files containing social security numbers
and other PII (Personally Identifiable
Information) sensi- tive information. You are
asked about controls placed on dissemination
of this information. Which of the following
acts should you check?
9. Joe has spent a large amount of time learning hacking Hactivism
tools and techniques, and has even passed
certifica- tion exams to promote himself in the
ethical hacking field. Joe uses his talents
during the election season to deface websites
and launch denial of service attacks against
opponents of his candidate. Which answer
most closely correlates with Joe's actions?
10. A hacker is attempting to gain access to a Availability
target in- side a business. After trying several
methods, he gets frustrated and starts a denial
of service attack against a server attached to
the target. Which security control is the hacker
affecting?
11. The security, functionality, and ease of use (SFE) trian- As security
increases, ease
gle states which of the following as true?
3/
52
, CEH Practice Exam
Questions
of use decreases and
12. In which phase of the ethical hacking functionality decreases.
methodology would a hacker discover available
targets on a net- work? Scanning and enumera-
tion
4/
52