🔥 40% Off Crucial Exams Memberships — Deal ends today!

1 hour, 51 minutes remaining!

Certified Ethical Hacker (CEH) Practice Question

After running a credentialed scan on the client's DMZ, you are writing the final vulnerability assessment report. To make sure the operations team can reproduce each issue during remediation testing, which item must be included in the report's technical findings section?

  • Step-by-step proof-of-concept instructions demonstrating how the vulnerability was exploited

  • A table mapping each vulnerability to the corresponding MITRE ATT&CK technique

  • High-level business risk summary intended for non-technical stakeholders

  • Excerpts from the customer's security policies related to the affected systems

Certified Ethical Hacker (CEH)
System Hacking Phases and Attack Techniques
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot