🔥 40% Off Crucial Exams Memberships — Deal ends today!

3 hours, 31 minutes remaining!
00:20:00

Certified Ethical Hacker (CEH) Practice Test

Use the form below to configure your Certified Ethical Hacker (CEH) Practice Test. The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for Certified Ethical Hacker (CEH)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

Certified Ethical Hacker (CEH) Information

About the Certified Ethical Hacker (CEH) Exam

The EC-Council's Certified Ethical Hacker (CEH) 312-50 exam is a globally recognized certification designed for cybersecurity professionals. The exam validates a professional's foundational knowledge of ethical hacking tools, techniques, and methodologies. It consists of 125 multiple-choice questions that must be completed within a four-hour timeframe. The primary goal of the CEH certification is to ensure that the holder can identify vulnerabilities and weaknesses in computer systems by thinking and acting like a malicious hacker, but with the owner's permission. This certification is intended for a range of professionals, including security officers, auditors, site administrators, and anyone concerned with the integrity of their network infrastructure.

Domains Covered in the CEH Exam

The CEH 312-50 exam covers a broad spectrum of topics, structured into various modules. These domains are designed to provide a comprehensive understanding of the ethical hacking process from start to finish. Some of the core areas include an introduction to ethical hacking, footprinting, and reconnaissance to gather information about a target. Candidates are also tested on network scanning techniques, enumeration to identify users and resources, and vulnerability analysis to uncover security loopholes. Furthermore, the exam delves into more offensive topics such as system hacking, malware threats, sniffing to intercept network traffic, and social engineering. Advanced topics like Denial-of-Service (DoS) attacks, session hijacking, hacking web servers and applications, SQL injection, and hacking wireless networks are also integral parts of the curriculum. The syllabus also includes modern security challenges related to cloud computing, the Internet of Things (IoT), and mobile platforms.

The Benefit of CEH Practice Exams

Incorporating practice exams into your study routine is a highly effective strategy for preparing for the CEH 312-50 exam. These mock tests are designed to replicate the actual exam environment, helping you become familiar with the format, timing, and difficulty of the questions. By taking practice exams, you can significantly improve your time management skills, which is crucial for completing all 125 questions within the four-hour limit. One of the most significant benefits of practice exams is their ability to help you identify your weak areas. Analyzing your performance on these tests allows you to pinpoint specific domains where you need to focus your studies, making your preparation more efficient. Regularly taking practice tests can also boost your confidence and reduce test anxiety, ensuring you perform at your best on the actual exam day.

Certified Ethical Hacker (CEH) Logo
  • Free Certified Ethical Hacker (CEH) Practice Test

  • 20 Questions
  • Unlimited time
  • Information Security and Ethical Hacking Overview
    Reconnaissance Techniques
    System Hacking Phases and Attack Techniques
    Network and Perimeter Hacking
    Web Application Hacking
    Wireless Network Hacking
    Mobile Platform, IoT, and OT Hacking
    Cloud Computing
    Cryptography
Question 1 of 20

During an internal audit you discover that staff can still transfer confidential data to personal USB drives. Management already reviews system logs weekly and has a policy that forbids such behavior, but wants a technical measure that blocks it outright. According to standard security control categories, which control type best meets this requirement?

  • Deploy a detective control that generates real-time alerts whenever files are written to USB media

  • Strengthen the deterrent control by displaying legal warning banners about data exfiltration penalties

  • Implement a preventive control that disables or restricts USB mass-storage devices on all workstations

  • Add a corrective control that automatically deletes unauthorized files from USB drives after transfer

Question 2 of 20

During a penetration test of a U.S. commercial bank, you obtain files containing customers' social security numbers, account balances, and loan histories. The bank's legal counsel reminds you that a specific federal law mandates protection of this non-public personal information and requires the institution to issue privacy notices to customers. Which regulation are they referring to?

  • Payment Card Industry Data Security Standard (PCI DSS)

  • Health Insurance Portability and Accountability Act (HIPAA)

  • Gramm-Leach-Bliley Act (GLBA)

  • Children's Online Privacy Protection Act (COPPA)

Question 3 of 20

During an internal assessment you transmit thousands of DHCPDISCOVER messages, each with a unique spoofed MAC address, until the corporate DHCP server's address pool is completely exhausted. You then launch your own unauthorized DHCP service in 'authoritative' mode that responds first and assigns new hosts an IP configuration whose default gateway points to your laptop, allowing you to capture their traffic. Which DHCP-based attack technique are you executing?

  • Abusing DHCP Option 82 to spoof relay information and redirect traffic.

  • A DHCP starvation attack combined with a rogue DHCP server takeover to perform a man-in-the-middle.

  • A broadcast smurf-style DHCP flood intended only to crash the server.

  • DHCP relay agent spoofing to circumvent VLAN access-control lists.

Question 4 of 20

An ethical hacker uses theHarvester to gather staff email addresses from public search engines and LinkedIn without interacting directly with the target's infrastructure. According to the standard hacking methodology, which phase is being conducted and what form of reconnaissance is this?

  • Enumeration and active reconnaissance

  • Gaining access and passive reconnaissance

  • Footprinting and passive reconnaissance

  • Scanning and active reconnaissance

Question 5 of 20

During an internal penetration test you compromise a Windows workstation and, with Responder, capture the domain administrator's NTLMv2 hash over SMB. Cracking the hash is unlikely to succeed before the engagement ends, but the environment still allows NTLM authentication. Which technique will let you open an interactive shell on another domain-joined server without first recovering the clear-text password?

  • Conduct a password-spraying campaign across domain hosts with the administrator username and a shortlist of common passwords.

  • Forge a Golden Ticket for the administrator by generating a counterfeit krbtgt ticket and injecting it into your session.

  • Use a pass-the-hash attack with an SMB execution tool such as Impacket's psexec.py to authenticate using the captured NTLM hash.

  • Request and crack the administrator's service tickets through Kerberoasting, then reuse the recovered keys to log in.

Question 6 of 20

During a Windows desktop security review, you must recommend a built-in countermeasure that will help endpoint anti-malware engines detect fileless attacks launched through PowerShell, VBScript, or WMI without relying on a signature stored on disk. Which native feature should you ensure is enabled so the AV solution can inspect the script content in memory?

  • Encrypting File System (EFS)

  • BitLocker with TPM-only mode

  • Windows Anti-Malware Scan Interface (AMSI)

  • Microsoft Software Restriction Policies (SRP)

Question 7 of 20

While analyzing switch port mirroring logs, you notice host 52:54:00:ab:cd:ef repeatedly sending unsolicited ARP reply packets that state "192.168.50.1 is-at 52:54:00:ab:cd:ef," even though the legitimate default gateway has MAC 00:25:90:12:34:56. Shortly afterward, several workstations begin routing their traffic through the rogue host. Which sniffing-related spoofing technique is the attacker using to redirect the traffic?

  • ARP poisoning (ARP spoofing) to perform a man-in-the-middle attack

  • DNS cache poisoning to redirect hostname lookups

  • MAC flooding to overflow the switch's CAM table

  • DHCP spoofing to issue fraudulent default-gateway information

Question 8 of 20

An organization enables 802.11w Protected Management Frames (PMF) on all enterprise access points. During a wireless security assessment, which previously common threat is largely neutralized because the attacker can no longer inject forged management frames that force clients off the network?

  • Setting up an Evil Twin rogue access point broadcasting the same SSID

  • Sending repeated ARP request packets to accelerate IV reuse and crack WEP keys

  • Brute-forcing the WPS PIN to recover the WPA/WPA2 passphrase

  • Flooding clients with spoofed deauthentication or disassociation frames to force reconnects

Question 9 of 20

While conducting a penetration test against the /24 network range explicitly authorized in the contract, you discover an unsecured FTP service whose IP address belongs to an external third-party vendor that was never mentioned during scoping. According to ethical hacking concepts and professional conduct, what action should you take next?

  • Proceed to exploit the FTP server only enough to capture evidence of the vulnerability.

  • Ignore the finding and continue testing the originally scoped IP addresses.

  • Contact the vendor directly, obtain verbal permission, and then resume testing the discovered server.

  • Notify the client immediately and request written authorization before performing any further testing against the vendor's system.

Question 10 of 20

While performing a black-box engagement, you have completed banner grabbing and verified that the target is running Apache 2.4.54 on Debian 11. According to a standard web-server attack methodology, which action should you take NEXT before choosing an exploit to launch against the host?

  • Begin brute-forcing SSH credentials in order to obtain remote shell access.

  • Replace the server's TLS certificate with a self-signed one to weaken client trust.

  • Launch a full-scale denial-of-service attack to test the server's resilience.

  • Enumerate accessible directories, enabled modules, and sample scripts to locate misconfigurations.

Question 11 of 20

During a penetration test you capture an SMTP session between the organization's mail server and an external partner. After the EHLO exchange you see the command 'STARTTLS' followed by a TLS handshake. Management claims this means all outbound email is now fully encrypted until it reaches recipients. As the consultant, what is the correct explanation?

  • It establishes an IPsec ESP tunnel between sender and recipient networks, protecting headers and body throughout transit.

  • The command digitally signs each message with the server's certificate, providing authenticity but not confidentiality.

  • STARTTLS guarantees end-to-end encryption of the message body until it is opened in the recipient's mail client.

  • The SMTP channel is encrypted only for this hop; without S/MIME or OpenPGP the message can still be stored or forwarded in clear text later.

Question 12 of 20

While assessing a Java-based site, you run DirBuster and learn that /WEB-INF/web.xml is openly accessible from the Internet. According to the CEH Web Application Hacking Methodology, during which phase would you catalogue and examine such exposed configuration files?

  • Bypass client-side controls

  • Footprint web infrastructure

  • Analyze web applications

  • Attack authentication mechanisms

Question 13 of 20

During reconnaissance you must find examplecorp.com's public web servers exposing the Apache mod_status (server-status) page, using only passive Shodan queries. Which search string will most directly list company hosts that reveal the mod_status page?

  • http.favicon.hash:-123456789 "examplecorp.com"

  • http.component:"Apache" http.status:200 hostname:"examplecorp.com"

  • "server-status" "examplecorp.com"

  • http.title:"Apache Status" hostname:"examplecorp.com"

Question 14 of 20

During a web-application penetration test, you discover a critical SQL-injection flaw in the customer portal. Because the development team cannot immediately patch the code, you recommend creating a new rule on the organization's web-application firewall (WAF) to block malicious input that matches common SQL-injection patterns. According to standard information-security control functions, this WAF rule is best classified as which type of control?

  • Preventive control

  • Detective control

  • Corrective control

  • Compensating control

Question 15 of 20

A penetration tester wants to inventory live TCP services on a DMZ host while minimizing the chance that the host application logs the activity. Using the standard Nmap syntax, which scan type meets this goal by sending only an initial SYN and interpreting the target's SYN-ACK or RST response instead of completing the three-way handshake?

  • TCP ACK scan: nmap -sA

  • TCP FIN scan: nmap -sF

  • TCP SYN (half-open) scan: nmap -sS

  • TCP connect scan: nmap -sT

Question 16 of 20

An ethical hacker is in the reconnaissance stage and must collect as much detail as possible while guaranteeing zero packets reach the client's network to avoid IDS detection. Which of the following methods satisfies this requirement?

  • Run an Nmap UDP scan (-sU) against the organization's external IP range from an off-site host.

  • Establish anonymous SMB sessions from a cloud VPS to enumerate open network shares.

  • Send crafted AXFR requests to the company's authoritative DNS server to obtain its zone file.

  • Review the target's domain registration details using a public WHOIS lookup service.

Question 17 of 20

During an internal penetration test you captured the NTLM hash of the local Administrator account from several Windows 10 workstations using an SMB relay attack. The customer's endpoint detection rules quarantine any new executables written to disk, so you must avoid dropping files on the target. Which approach allows you to execute commands on one of the compromised hosts while honoring this restriction?

  • Forge a Golden Ticket for the Administrator account and authenticate via Kerberos to obtain a remote shell.

  • Start a password-guessing attack against the local Administrator account until the clear-text password is discovered.

  • Use PsExec with the stolen hash to install its service and open an interactive shell over SMB.

  • Leverage Impacket's wmiexec.py to perform a Pass-the-Hash attack over WMI and run commands in memory on the remote host.

Question 18 of 20

While exploiting an unrestricted server-side request forgery in a web application that runs on an Amazon EC2 instance, you intend to retrieve the instance's temporary AWS credentials. The instance still exposes the original Instance Metadata Service (IMDSv1). Which internal URL should you request through the SSRF so that the response contains the JSON document with AccessKeyId, SecretAccessKey, and SessionToken values?

Question 19 of 20

During a red-team engagement, your goal is to overwhelm a target's Internet link while having only a small uplink yourself. You decide to send forged 60-byte UDP queries to publicly accessible NTP servers so they reply with kilobytes of data toward the victim's IP address. Which DoS/DDoS attack technique are you preparing to use?

  • Executing a Slowloris slow-header attack against the NTP control interface

  • Launching an NTP amplification attack that abuses the monlist command

  • Triggering a teardrop fragmentation attack to crash the victim's TCP/IP stack

  • Sending a TCP SYN flood aimed at port 123/UDP on the victim

Question 20 of 20

During an internal security assessment you are allowed to run only active tests that will not disrupt production. To identify any workstations on a switched Ethernet segment that have their network cards set to promiscuous (sniffer) mode, you transmit a single Ethernet frame carrying an ARP request that lists the suspected host's IP address but sets the frame's destination MAC to 00:11:22:33:44:55-an address that does not belong to any device on the segment and is not the broadcast address. Which observation would confirm that the workstation is operating in promiscuous mode?

  • The switch's CAM table briefly overflows and the uplink port shows a spike in traffic from multiple VLANs.

  • Repeated 802.1X EAP authentication failures are logged on the switch port connected to the workstation.

  • The workstation ignores the request but later sends a gratuitous ARP advertising its MAC for the same IP address.

  • The workstation replies with a valid ARP response even though the request's Layer-2 destination MAC does not match its own or the broadcast address.