Skip to main content
Cybersecurity ⭐ Premium

EC-Council Certified Ethical Hacker (CEH) - 340 Questions

By Webmaster Certland ❤️ 0 likes

Practice exam for the EC-Council Certified Ethical Hacker (CEH) certification. Covers all 20 CEH modules including footprinting, scanning, enumeration, system hacking, malware threats, social engineering, web application attacks, wireless hacking, IoT, cloud, and cryptography.

🔒

Premium Content

This exam is exclusive to Premium users. Upgrade to get unlimited access!

Become Premium

👁️ Free Preview (5 of 340 questions)

1. A security consultant is explaining the CIA triad to a new client. The client asks which property ensures that only authorized individuals can read sensitive data. Which element of the CIA triad does this describe?

A Confidentiality
B Integrity
C Availability
D Non-repudiation

2. During a security awareness training, a trainer asks participants to identify which hacker classification describes someone who hacks systems without authorization and with malicious intent for personal gain. Which classification is correct?

A White hat hacker
B Black hat hacker
C Grey hat hacker
D Script kiddie

3. An ethical hacker is preparing a penetration test engagement. She is reviewing the five phases of ethical hacking and wants to confirm the correct sequence. Which of the following represents the correct order?

A Scanning, Reconnaissance, Gaining Access, Maintaining Access, Covering Tracks
B Reconnaissance, Scanning, Maintaining Access, Gaining Access, Covering Tracks
C Reconnaissance, Scanning, Gaining Access, Maintaining Access, Covering Tracks
D Reconnaissance, Gaining Access, Scanning, Covering Tracks, Maintaining Access

4. A threat intelligence analyst is reviewing a recent attack campaign. She notices the attackers first researched the target organization publicly, then sent a spear-phishing email with a malicious attachment. After the employee clicked, a backdoor was installed. Which phase of the Cyber Kill Chain does the initial spear-phishing delivery represent?

A Weaponization
B Delivery
C Exploitation
D Installation

5. During a threat hunting exercise, a security team wants to map observed attacker behaviors to a structured framework that categorizes tactics, techniques, and procedures (TTPs). Which framework is specifically designed for this purpose?

A MITRE ATT&CK framework
B Cyber Kill Chain
C NIST SP 800-53
D OWASP Top 10

Want to test yourself for real?

Create a free account and run our exam simulation engine.

Free No credit card
  • Simulation engine
  • Up to 10 questions per attempt
  • Score & basic stats
Create free account Already have an account? Sign in
Best
Premium 7-day trial
  • All 340 questions
  • Detailed explanations
  • Smart Practice + Focus Mode
⭐ Start 7-day free trial

Information

Questions 340
Time 4h
Difficulty Medium
Minimum Score 70.00%

🤍 Like

Related Exams

Discussion

No comments yet. Be the first to start the discussion!

Sign in to join the discussion.