Skip to main content
EC-Council ⭐ Premium ⭐ Featured

EC-Council Certified Ethical Hacker (CEH)

By Webmaster Certland English 📝 340 questions ❤️ 0 likes

Practice exam for the EC-Council Certified Ethical Hacker (CEH) certification. Covers all 20 CEH modules including footprinting, scanning, enumeration, system hacking, malware threats, social engineering, web application attacks, wireless hacking, IoT, cloud, and cryptography.

⭐ Premium Updated Mar 2026

Unlock all 340 EC-Council Certified Ethical Hacker (CEH) questions

Full simulation · Detailed explanations · Unlimited attempts

  • 340 questions — ~5 full-length simulations
  • Detailed explanations — why each answer is right or wrong
  • Unlimited attempts — retake as many times as needed
  • Smart Practice + Focus Mode + no ads
340
Questions
All certifications
from $4.90/mo

Sample Questions — EC-Council Certified Ethical Hacker (CEH)

5 free sample questions from this practice exam. Correct answers are highlighted.

1. A security consultant is explaining the CIA triad to a new client. The client asks which property ensures that only authorized individuals can read sensitive data. Which element of the CIA triad does this describe?

A Confidentiality ✓ Correct
B Integrity
C Availability
D Non-repudiation

2. During a security awareness training, a trainer asks participants to identify which hacker classification describes someone who hacks systems without authorization and with malicious intent for personal gain. Which classification is correct?

A White hat hacker
B Black hat hacker ✓ Correct
C Grey hat hacker
D Script kiddie

3. An ethical hacker is preparing a penetration test engagement. She is reviewing the five phases of ethical hacking and wants to confirm the correct sequence. Which of the following represents the correct order?

A Scanning, Reconnaissance, Gaining Access, Maintaining Access, Covering Tracks
B Reconnaissance, Scanning, Maintaining Access, Gaining Access, Covering Tracks
C Reconnaissance, Scanning, Gaining Access, Maintaining Access, Covering Tracks ✓ Correct
D Reconnaissance, Gaining Access, Scanning, Covering Tracks, Maintaining Access

4. A threat intelligence analyst is reviewing a recent attack campaign. She notices the attackers first researched the target organization publicly, then sent a spear-phishing email with a malicious attachment. After the employee clicked, a backdoor was installed. Which phase of the Cyber Kill Chain does the initial spear-phishing delivery represent?

A Weaponization
B Delivery ✓ Correct
C Exploitation
D Installation

5. During a threat hunting exercise, a security team wants to map observed attacker behaviors to a structured framework that categorizes tactics, techniques, and procedures (TTPs). Which framework is specifically designed for this purpose?

A MITRE ATT&CK framework ✓ Correct
B Cyber Kill Chain
C NIST SP 800-53
D OWASP Top 10

Want to test yourself for real?

Create a free account and run our exam simulation engine.

Free No credit card
  • Simulation engine
  • Up to 10 questions per attempt
  • Score & basic stats
Create free account Already have an account? Sign in
Best
Premium Premium
  • All 340 questions
  • Detailed explanations
  • Smart Practice + Focus Mode
⭐ Get Premium

Information

Questions 340
Time 4h
Difficulty Medium
Minimum Score 70.00%


💰 ROI

Official exam $950.00
CertLand $4.90/mo
Prepare for $950 for less than a coffee/mo

Study Guides & Articles

Discussion

No comments yet. Be the first to start the discussion!

Sign in to join the discussion.