Certification Practice Test Sample Questions For Certified Ethical Hacking
QuickStart is now offering sample questions for Certification Exam Prep Questions For Certified Ethical Hacking. Whether you are deciding which exam to sign up for, or simply want to practice the materials necessary to complete certification for this course, we have provided a practice test to better aid in certification. 100% of the questions are real test questions; from a recent version of the Certification Exam Prep Questions exam For Certified Ethical Hacking.

Certified Ethical Hacking Sample Exam Questions
Which individuals believe that hacking and defacing websites can promote social change?
- A. Ethical hackers
-
Incorrect.
- B. Hactivists
-
Correct!
- C. Gray hat hackers
-
Incorrect.
- D. Black hat hackers
-
Incorrect.
Which type of testing occurs when individuals know the entire layout of the network?
This type of security test usually takes on an adversarial role and looks to see what an outsider can access and control.
- A. High-level evaluation
-
Incorrect.
- B. Network evaluation
-
Incorrect.
- C. Policy assessment
-
Incorrect.
- D. Penetration test
-
Correct!
Which type of penetration test is characterized by its examination of technologies such as old copiers or telecommunication taken from the trash on private property?
- A. Stolen equipment
-
Correct!
- B. Communication systems
-
Incorrect.
- C. Database testing
-
Incorrect.
- D. Denial of service
-
Incorrect.
Which type of hacker will carry out an attack even if they might get a very long prison term?
During a security review you have discovered that there are no documented security policies for the area you are assessing. Which of the following would be the most appropriate course of action?
- A. Identify and evaluate current practices
-
Correct!
- B. Create policies while testing
-
Incorrect.
- C. Increase the level of testing
-
Incorrect.
- D. Stop the audit
-
Incorrect.
Which of the following is the most important step for the ethical hacker to perform during the pre-assessment?
- A. Hack the web server
-
Incorrect.
- B. Gather information about the target
-
Incorrect.
- C. Obtain permission to hack
-
Incorrect.
- D. Obtain written permission to hack
-
Correct!
Attackers sometimes hang on to unknown vulnerabilities until they can be used in an attack that has no known defense or patch. Some might call Flame and Stuxnet these types of attacks. Which of the following offers the best description?
- A. Zero day
-
Correct!
- B. Unpatched vulnerability
-
Incorrect.
- C. Unknown attack
-
Incorrect.
- D. Polymorphic
-
Incorrect.
When you are assessing backup methods, what is the proper restoration technique if a full backup was performed on Monday and an incremental was performed on Tuesday, Wednesday, and Thursday, with the outage occurring on Friday?
- A. Only the incremental backups
-
Incorrect.
- B. The full backup and all three incrementals
-
Correct!
- C. Only the full backup
-
Incorrect.
- D. The full backup and only the last incremental
-
Incorrect.
Phishing, social engineering, and buffer overflows are all usually used at what point in the attacker’s process?
- A. Backdoors
-
Incorrect.
- B. Covering tracks
-
Incorrect.
- C. Port scanning
-
Incorrect.
- D. Gaining access
-
Correct!
Which DNS record gives information about the zone, such as administrator contact, and so on?
While preparing to hack a targeted network, you would like to check the configuration of the DNS server. What port should you look for to attempt a zone transfer?
You have become concerned that someone could attempt to poison your DNS server. What determines how long cache poisoning would last?
Which of the following is a Class D address?
You have captured data from a client to an HTTP server and would like to use Wireshark to filter for the first step of the TCP handshake. Which of the following TCP flags is set?
Which of the following breaks down security assessments into four basic stages, which include planning, discovery, attack, and reporting?
Which wireless attack involves creating a rogue access point that mimics a legitimate one?
- A. Evil Twin
-
Correct!
- B. Deauthentication
-
Incorrect.
- C. Packet Sniffing
-
Incorrect.
- D. Replay
-
Incorrect.
Which of the following is used for an ICMP unreachable message?
Which of the following attacks specifically targets the hypervisor layer in a cloud environment to gain access across guest VMs?
- A. VM escape
-
Correct!
- B. Side-channel timing attack
-
Incorrect.
- C. Metadata API manipulation
-
Incorrect.
- D. Cross-tenant VM snooping
-
Incorrect.
You are performing a penetration test and have been asked to identify any web servers that might be vulnerable to shellshock. Which of the following tools support scripts that enable you to search for these devices?
You have just performed an ACK scan and have been monitoring a sniffer while the scan was performed. The sniffer captured the result of the scan as an ICMP type 3 code 13. What does this result mean?
- A. The port is open.
-
Incorrect.
- B. The firewall is only a router with an ACL.
-
Correct!
- C. Port knocking is used.
-
Incorrect.
- D. The port is closed.
-
Incorrect.
Which of the following is a passive OS fingerprinting tool?
During a footprinting exercise, you are asked to find and extract metadata from documents hosted on the target company’s website. Which of the following is your best option?
Which encryption algorithm is symmetric?
Which technique is used to avoid detection by IDS during scanning?
- A. Packet fragmentation
-
Correct!
- B. Spoofing
-
Incorrect.
- C. Flooding
-
Incorrect.
- D. Escalation
-
Incorrect.
A connect or SYN scan of an open port produces which of the following responses from a target?
Which of the following hping commands could you use to ping 192.168.123.1?
- A. hping3 192.168.123.1 -Q -p 139 -s
-
Incorrect.
- B. hping3 -A 192.168.123.1 -p 80
-
Incorrect.
- C. hping3 -2 192.168.123.1
-
Incorrect.
- D. hping3 -1 192.168.123.1
-
Correct!
Which of the following types of biometric systems is considered the most accurate?
- A. Fingerprint scanning
-
Incorrect.
- B. Iris scanning
-
Correct!
- C. Voice scanning
-
Incorrect.
- D. Palm scanning
-
Incorrect.
You have gained access to a system. You would now like to hide a file that will be hidden and streamed behind another. Which of the following file systems is required?
During a pen test, you have successfully gained access to a system. You were are able to gain local administrator status on one workstation and have now moved to local administrator on a second workstation. With this in mind, which of the following is true?
- A. You have no access.
-
Incorrect.
- B. You will have a RID of 501.
-
Incorrect.
- C. You have completed vertical privilege escalation.
-
Incorrect.
Before We Display the Practice Results,
Tell Us About You:
By submitting this information, I agree to receive phone calls/SMS/email updates from QuickStart.
See our Privacy Policy.
Get Your FREE
Test Results Emailed!
You've completed the test - now get your results delivered instantly via email. Enter a valid email to receive your full score breakdown.
- Home
- Certified Ethical Hacker
Certified Ethical Hacker
More Information:
- Learning Style: On Demand
- Learning Style: Practice Exam
- Difficulty: Beginner
- Course Duration: 1 Hour
- Course Info: Download PDF
- Certificate: See Sample
Contact a Learning Consultant
Need Training for 5 or More People?
Customized to your team's need:
- Annual Subscriptions
- Private Training
- Flexible Pricing
- Enterprise LMS
- Dedicated Customer Success Manager
Course Information
