...

CEH Certification Practice Test: 65+ Must-Know Questions

The CEH certification (Certified Ethical Hacker) is one of the most widely recognized credentials for professionals entering or advancing in offensive cybersecurity roles. Offered by EC-Council, CEH certification validates foundational knowledge across ethical hacking techniques, attack methodologies, tools, and—most importantly—ethical responsibility.

Unlike narrowly focused penetration testing certifications, the CEH certification is broad by design. It introduces candidates to networking fundamentals, reconnaissance, vulnerability assessment, system hacking, and security controls, all through the lens of an ethical hacker operating under legal authorization.

This article is written for aspiring ethical hackers, SOC analysts, security engineers, and IT professionals currently studying for CEH certification or evaluating whether it aligns with their career goals. You’ll gain a clear understanding of what CEH certification actually tests, how to think through exam scenarios, and why conceptual clarity matters more than memorization.

A complete free practice test, quiz, and flashcards related to this topic are available at the bottom of this article.

What the CEH Certification Is (and Is Not)

The CEH certification is an entry-to-intermediate credential focused on awareness, methodology, and controlled offensive thinking. It does not certify mastery of exploitation frameworks or real-world red-team operations.

Instead, CEH emphasizes:

  • Understanding how attacks work
  • Recognizing attacker behavior and intent
  • Knowing which tools are used and why
  • Applying ethical and legal constraints at every step

This is why CEH remains popular with organizations—it ensures that certified professionals understand both offense and responsibility.

Ethics and Professional Responsibility in CEH

One of the most underestimated CEH certification topics is ethics.

Ethical hacking begins with authorization, confidentiality, and trust. CEH scenarios frequently reinforce that sensitive information discovered during an engagement must be protected and not disclosed, regardless of how valuable or interesting it may be.

From an exam perspective, this means:

  • Client confidentiality always outweighs curiosity
  • Sensitive findings are reported only through approved channels
  • Sharing discovered data externally is a violation of ethics

This ethical foundation appears early and often in CEH-style questions because it defines what separates an ethical hacker from a malicious one .

Reconnaissance and OSINT: Learning Before Touching

Passive vs Active Information Gathering

CEH places strong emphasis on reconnaissance, especially open-source intelligence (OSINT). Candidates are expected to understand how attackers gather information before launching attacks.

Examples include:

  • Using public job postings to infer technology stacks
  • Querying DNS records to map domains
  • Using WHOIS to identify IP ownership

A critical CEH lesson is that information exposure often starts publicly, long before a firewall is tested.

Networking Fundamentals Every CEH Candidate Must Know

OSI Model and Device Roles

CEH expects candidates to understand foundational networking concepts without ambiguity. For example:

  • Switches primarily operate at Layer 2, forwarding traffic using MAC addresses
  • Routers function at Layer 3, making IP-based decisions

These aren’t trick questions—but they expose weak fundamentals quickly.

TCP/IP and the Three-Way Handshake

The TCP three-way handshake (SYN, SYN/ACK, ACK) establishes:

  • Reliable communication
  • Sequence number synchronization
  • Session readiness

Understanding this process is essential for grasping port scanning, session hijacking, and firewall behavior.

Scanning and Enumeration: Seeing What Exists

Port Scanning Logic

Tools like nmap are central to CEH, but the exam focuses on why scans behave a certain way.

For example:

  • A SYN scan is “half-open” and more stealthy
  • A TCP Connect scan completes the handshake and is easily logged

Understanding scan behavior matters more than memorizing flags.

UDP Ambiguity

UDP scanning introduces uncertainty. When a scanner reports open|filtered, it means:

  • No response was received
  • The port may be open or filtered by a firewall

CEH tests your ability to interpret ambiguity, not just outputs.

Vulnerability Scanning vs Exploitation

A core CEH certification distinction is between finding weaknesses and exploiting them.

Vulnerability scanners such as Nessus or OpenVAS:

  • Identify known issues
  • Match services to vulnerability signatures
  • Do not exploit systems

CEH expects candidates to recognize that scanners support risk identification, not compromise.

False Positives and False Negatives Explained

This concept appears frequently because it mirrors real-world security operations.

  • False positives: Reported issues that don’t actually exist
  • False negatives: Real vulnerabilities that go undetected

False negatives are more dangerous because they create a false sense of security—a critical insight for any ethical hacker.

System Hacking and Persistence

Maintaining Access (Persistence)

Once access is gained, attackers often attempt to maintain it. In CEH, this phase focuses on:

  • Backdoors
  • Scheduled tasks
  • Persistence mechanisms surviving reboots

Understanding persistence helps defenders detect long-term compromise

Firewalls and Security Controls

Stateful vs Deep Packet Inspection (DPI)

CEH distinguishes between firewall types:

  • Stateful firewalls track connection state
  • DPI firewalls inspect packet payloads for malicious content

This distinction helps candidates understand layered defenses and detection depth.

Administrative Controls Matter

Not all security controls are technical. Policies, standards, and procedures are classified as administrative controls, reinforcing that security governance extends beyond hardware and software.

DNS, SMTP, and Service Enumeration

CEH tests protocol-specific enumeration knowledge, such as:

  • NS records identifying authoritative name servers
  • VRFY command for SMTP user validation
  • rpcinfo for enumerating RPC services

These topics emphasize how misconfigured services leak information.

Exploit Databases and Proof of Concept Code

CEH does not require exploit development, but it expects awareness of resources like Exploit-DB:

  • A repository of public exploit code
  • Used for validation and testing
  • Searchable via tools like searchsploit

This reinforces ethical usage: understanding exploits, not weaponizing them irresponsibly.

Advanced Concepts: Kerberoasting and Lateral Movement

CEH introduces modern attack techniques at a conceptual level. For example:

  • Kerberoasting targets service account tickets in Active Directory
  • Extracted tickets are cracked offline to recover passwords

The goal is awareness—recognizing attack patterns defenders must mitigate.

How to Study for the CEH Certification Effectively

Focus on Concepts, Not Tools Alone

CEH exams reward candidates who:

  • Understand attack logic
  • Interpret scenarios correctly
  • Apply ethical constraints consistently

Memorizing commands without understanding why they work is a common failure point.

Use Practice Tests for Knowledge Validation

High-quality practice questions help you:

  • Identify weak conceptual areas
  • Reinforce correct reasoning
  • Practice interpreting exam-style scenarios

They should be treated as learning tools, not predictors or guarantees of exam outcomes.

Please do not forget to checkout other free EC-Council practice tests on CertyBuddy.com: https://certybuddy.com/practice-tests/?vendor=ec-council

External References for Deeper Learning

For authoritative and up-to-date material, consult:

Conclusion: What CEH Certification Really Proves

The CEH certification demonstrates that you understand how attacks work, how systems fail, and how ethical boundaries shape professional security testing. It does not promise instant expertise—but it establishes a solid foundation for defensive and offensive roles alike.

If you’re preparing for CEH, the most effective next step is to validate your understanding, identify gaps, and reinforce fundamentals.

Start now by exploring CertyBuddy’s free CEH practice tests, quizzes, and flashcards to strengthen your confidence and confirm your readiness—one concept at a time.

/66
1

Ultimate EC-Council CEH Certification (v12) Practice Test

This psychological trigger is why a uniform or a title can be so persuasive.

1 / 66

Which principle of social engineering relies on the human tendency to comply with requests from figures like police officers, managers, or IT support personnel?

This architecture removes a major component that system administrators traditionally spend a lot of time securing and patching.

2 / 66

What is a primary security benefit of a ‘serverless’ computing architecture?

This function involves implementing the safeguards that are in place before an incident occurs.

3 / 66

The NIST Cybersecurity Framework is built around five core functions. Which function is concerned with developing and implementing appropriate activities to ensure the resilience of systems and the organization?

Imagine having data on an old floppy disk but no floppy drive to read it; the data lacks this property.

4 / 66

According to the Parkerian Hexad, which property describes the usability of data, considering factors like format and accessibility with current technology?

This model creates a ‘demilitarized zone’ between the business network and the factory floor network.

5 / 66

The Purdue Model for Industrial Control Systems (ICS) architecture is designed to create separation between different functional zones. What is the primary purpose of this segmentation?

This option helps you distinguish between different types of web servers running on port 80, for example.

6 / 66

An ethical hacker uses nmap with the `-sV` flag. What is the primary purpose of this flag?

This special address allows a machine to communicate with itself over the network stack.

7 / 66

In IPv4 addressing, what is the purpose of the 127.0.0.0/8 address range?

This type of malware acts like a chameleon, changing its appearance to blend in and avoid being caught.

8 / 66

What is the defining characteristic of polymorphic malware?

This tool helps identify services that allow programs on one computer to execute procedures on a remote server.

9 / 66

During service enumeration, an ethical hacker uses the `rpcinfo` command. What is the primary purpose of this tool?

This type of cryptography is used to solve the ‘key exchange problem’ at the beginning of a secure session.

10 / 66

In a hybrid cryptosystem used for a TLS connection, what is the typical role of asymmetric cryptography?

Think about the evolution of security in network management protocols, specifically regarding authentication and confidentiality.

11 / 66

What is the primary security weakness of SNMPv1 that SNMPv3 was designed to address?

Think of this as an attacker moving from room to room inside a house after breaking in through one window.

12 / 66

In the context of enterprise security, what is ‘lateral movement’?

Think about how TCP ensures that communication is reliable and ordered before any actual data is sent.

13 / 66

What is the primary purpose of the three-way handshake in the TCP protocol?

Consider how many keys are involved in the process for each type of cryptography.

14 / 66

What is the primary difference between symmetric and asymmetric key cryptography?

The key aspect of this attack is that the malicious script is saved by the website itself.

15 / 66

An attacker injects the following string into a comment box on a website: Screenshot From 2025 12 12 09 09 37. The script is saved by the server and executes in the browser of every user who views the page containing the search results. What type of attack is this?

This command’s name is an abbreviation for the action it performs: confirming an address.

16 / 66

An ethical hacker wants to enumerate users on a target’s SMTP server. Which SMTP command would be most direct for verifying if a single, specific username exists?

This is a specialized hardware component on the motherboard designed to handle cryptographic keys securely.

17 / 66

What is the primary function of a Trusted Platform Module (TPM) in relation to full disk encryption like BitLocker?

One of these scan types is considered ‘half-open’ and is less likely to show up in application logs.

18 / 66

In nmap, what is the key difference between a SYN scan (-sS) and a TCP Connect scan (-sT)?

This attack manipulates a local network’s ‘address book’ that maps IP addresses to physical hardware addresses.

19 / 66

What is the primary mechanism behind an ARP spoofing (or ARP poisoning) attack?

This process creates a digital ‘fingerprint’ of a file or message.

20 / 66

What is the purpose of a cryptographic hash function like SHA-256?

Consider the connectionless nature of UDP and how that makes it difficult to interpret a lack of a reply.

21 / 66

When performing a port scan, what does the state `open|filtered` typically indicate about a UDP port?

This property of the CIA triad ensures that data has not been tampered with or corrupted.

22 / 66

What security property is primarily compromised by a man-in-the-middle attack where data is intercepted and altered in transit?

This attack manipulates the application’s memory to change its flow of execution.

23 / 66

What is the primary goal of a buffer overflow attack?

This resource is the counterpart to a vulnerability database (like CVE); it contains the ‘how-to’ for taking advantage of the listed weaknesses.

24 / 66

What is the primary function of the Exploit-DB repository in the context of system hacking?

This term describes an event where two different items have the same ‘fingerprint’.

25 / 66

What is a ‘collision’ in the context of a cryptographic hash function?

One type of firewall remembers the conversation, while the other reads the conversation’s content.

26 / 66

What is the primary difference between a stateful firewall and a deep packet inspection (DPI) firewall?

This technique attempts to remove the ‘S’ (Secure) from web traffic.

27 / 66

An attacker on a local network uses a tool that intercepts HTTP traffic and replaces HTTPS links with HTTP links to capture credentials. What is this tool or technique called?

The name of this record type directly corresponds to its function of identifying servers that manage domain names.

28 / 66

An ethical hacker wants to find the authoritative name servers for a target domain. Which DNS record type should they query for?

By creating an attractive network, the attacker tricks users into connecting through their malicious device.

29 / 66

An attacker sets up a rogue Wi-Fi access point in a coffee shop with the SSID ‘Free_Coffee_Shop_WiFi’. What is the primary goal of this attack?

This architecture assumes an attacker will eventually get inside and focuses on making their subsequent actions difficult and noisy.

30 / 66

A security team implements a defensible network architecture. What is a key principle of this approach that distinguishes it from a traditional defense-in-depth model?

These tools are designed to find potential security holes, not to break through them.

31 / 66

What is a primary objective of a vulnerability scanner like OpenVAS or Nessus?

Each operator in a Google dork serves a very specific filtering function.

32 / 66

A penetration tester uses the Google dork `site:example.com filetype:pdf intext:”confidential”`. What is the goal of this search?

This software turns an infected machine into a ‘zombie’ awaiting orders from its master.

33 / 66

A botnet client is installed on a compromised computer. What is the primary function of this client software?

Consider the type of address this device uses to make its forwarding decisions on a local network.

34 / 66

A switch in a star network topology primarily operates at which layer of the OSI model?

This toolkit automates the use of a very popular and comprehensive penetration testing framework.

35 / 66

The Social-Engineer Toolkit (SET) is a powerful tool for automating attacks. What underlying framework does it primarily leverage for its payload and listener capabilities?

This process is designed to make the malicious payload look different each time to avoid signature-based security.

36 / 66

What is the primary purpose of using an encoder like `shikata_ga_nai` in `msfvenom`?

This technique is a form of brute-forcing, but for resource names instead of passwords.

37 / 66

When using a web enumeration tool like `gobuster` or `dirb`, what is the primary technique being employed?

This hardware device is like putting a ‘Y’ splitter in a network cable to get a copy of the data.

38 / 66

What is the primary function of a network tap in the context of sniffing?

This attack succeeds when the application mixes user data with database commands.

39 / 66

What is the primary vulnerability exploited by a SQL injection attack?

This technique attempts to get a full ‘phone book’ of a domain’s hosts, rather than asking for one number at a time.

40 / 66

What is the primary advantage of using a `zone transfer` over multiple individual DNS queries for reconnaissance?

This phase is also known as establishing ‘persistence’ on a compromised system.

41 / 66

In the five phases of ethical hacking, what is the key objective of the ‘Maintaining Access’ phase?

This technique involves sending a packet that violates the rules of the protocol to observe the target’s reaction.

42 / 66

An attacker uses the `hping` tool to send TCP packets with both the SYN and FIN flags set, a combination that should not occur in normal traffic. What is the likely purpose of this action?

These controls are about governance and managing people and processes, rather than technology or physical barriers.

43 / 66

Which type of security control are security policies, standards, and procedures considered to be?

Consider the level of responsibility: in one model you manage the operating system and applications, in the other you just use the software.

44 / 66

What is a key difference between IaaS (Infrastructure as a Service) and SaaS (Software as a Service)?

Think about how malware might hide its true code from static analysis tools.

45 / 66

An analyst examining a Portable Executable (PE) file finds that the `.text` section is very small, while the `.data` section is unusually large. What does this often indicate?

This model’s rules are designed to prevent information from flowing from a higher security level to a lower one.

46 / 66

The Bell-LaPadula security model is primarily concerned with enforcing which security principle?

Think about the ‘Required Skills’ section of a technical job posting.

47 / 66

During open-source intelligence (OSINT) gathering, what kind of information might an ethical hacker find in a company’s job listings on sites like LinkedIn?

Before you can move sideways, you often need to move up.

48 / 66

After gaining initial access to a Windows system with a low-privilege shell, what is the next logical step for an attacker aiming for deeper compromise?

Think about the physical layout and the components needed to prevent signal degradation in each setup.

49 / 66

What distinguishes a bus network topology from a star network topology?

This physical control system ensures that only one person can pass through a checkpoint for each successful authentication.

50 / 66

What is a ‘man trap’ designed to prevent?

IoT devices are typically single-purpose and lack the features of a general-purpose computer.

51 / 66

Which of the following would NOT be considered an Internet of Things (IoT) device?

This technique uses the first compromised machine as a stepping stone to reach deeper into the target’s network.

52 / 66

What is the technique of ‘pivoting’ in a penetration test?

This architectural style thinks of an application not as one big program, but as a collection of smaller, independent programs working together.

53 / 66

What is a key characteristic of a service-oriented architecture (SOA)?

This attack is like having one person take all the tickets from a dispenser, leaving none for anyone else.

54 / 66

What is the goal of a DHCP starvation attack?

This Windows file system feature allows a file to have more than one stream of data, but only one is typically visible.

55 / 66

An attacker hides a malicious payload within a seemingly benign file using an Alternate Data Stream (ADS) on an NTFS filesystem. What is the primary advantage of this technique?

This category of database is known for its schema-less flexibility and is often associated with modern web applications.

56 / 66

Which database type uses a flexible structure of key-value pairs, as might be represented by JSON, and does not enforce a rigid schema like a traditional relational database?

These organizations are responsible for the allocation and registration of number resources on the internet.

57 / 66

What is the primary purpose of using the `whois` tool against a Regional Internet Registry (RIR) like ARIN or RIPE NCC?

This technique is like leaving a tempting but dangerous object for someone to find.

58 / 66

What is the social engineering technique of ‘baiting’?

This type of ARP message is unsolicited and can be used to maliciously update the address tables of other devices.

59 / 66

A packet capture shows a series of gratuitous ARP packets being broadcast on the network. What is likely occurring?

This attack is like having many people start a conversation with a server but never finishing their sentences.

60 / 66

A `slowloris` attack is a type of denial-of-service attack that targets a web server. How does it work?

This type of analysis is like reading the blueprints of a machine without ever turning it on.

61 / 66

In malware analysis, what is the primary goal of static analysis?

This attack targets the authentication tickets used by service accounts in an Active Directory environment.

62 / 66

What is Kerberoasting?

This tool is part of the Samba package and serves as the non-Windows counterpart to a common Windows networking command.

63 / 66

What is a significant advantage of using the `nmblookup` tool on a Linux system during enumeration?

Consider the perspective of the scanner’s report versus the actual state of the system.

64 / 66

What is the primary difference between a false positive and a false negative in the context of a vulnerability scan?

This model offers a complete ‘platform’ for developers to build upon, without needing to manage the OS or underlying virtual machines.

65 / 66

Which cloud computing service model provides the customer with a pre-configured system including an operating system and enterprise software like a database server, but not the underlying hardware management?

The first word in ‘ethical hacking’ is the most important part of the phrase and guides professional conduct.

66 / 66

An ethical hacker signs an agreement to protect a client’s intellectual property. During an engagement, the hacker discovers sensitive internal information. According to the CEH code of ethics, what is the primary responsibility regarding this information?

Share your love
Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.