EC-Council Logo Signature
  • Train & Certify

    Certifications

    ETHICAL HACKING
    • Certified Ethical Hacker (C|EH)
    • C|EH (MASTER)
    EXECUTIVE MANAGEMENT
    • Certified Chief Information Security Officer (C|CISO)
    • Associate C|CISO
    COMPUTER FORENSICS
    • Computer Hacking Forensic Investigator (C|HFI)
    NETWORK SECURITY
    • Certified Network Defender (C|ND)
    • ICS/SCADA Cybersecurity
    ENCRYPTION
    • Certified Encryption Specialist (E|CES)
    PEN TESTING
    • Certified Penetration Testing Professional (C|PENT)
    INCIDENT HANDLING
    • Certified Incident Handler (E|CIH)
    • Certified Threat Intelligence Analyst (C|TIA)
    • Certified SOC Analyst (C|SA)
    CLOUD SECURITY
    • Certified Cloud Security Engineer (C|CSE)
    DevSecOps
    • Certified DevSecOps Engineer (E|CDE)
    CYBER TECHNICIAN
    • Certified Cybersecurity Technician (C|CT)
    BLOCKCHAIN
    • Blockchain Developer Certification (B|DC)
    • Blockchain Fintech Certification (B|FC)
    • Blockchain Business Leader Certification (B|BLC)
    BUSINESS CONTINUITY AND DISASTER RECOVERY
    • Disaster Recovery Professional (E|DRP)
    FUNDAMENTALS
    • Certified Secure Computer User (C|SCU)
    • EC-Council Certified Security Specialist (E|CSS)
    ESSENTIALS SERIES
    • Network Defense Essentials (N|DE)
    • Ethical Hacking Essentials (E|HE)
    • Digital Forensics Essentials (D|FE)
    • DevSecOps Essentials (D|SE)
    • SOC Essentials (S|CE)
    • Cloud Security Essentials (C|SE)
    • IoT Security Essentials (I|SE)
    • Threat Intelligence Essentials (T|IE)
    APPLICATION SECURITY
    • Certified Application Security Engineer (C|ASE .NET)
    • Certified Application Security Engineer (C|ASE Java)
    • Web Application Hacking and Security (W|AHS)

    Micro Learning

    • Python Programming for Beginners
    • Learn Python Online: From Novice to Pro
    • Microdegree in Python Security
    • Microdegree in PHP Security
    • Identity and Access Management
    • Linux Fundamentals
    • Linux-Server Administration
    • Cybersecurity for Blockchain from Ground Up
    • Cybersecurity for Business
    • Email Phishing
  • Degrees
    Graduate Certificate Program Bachelors of Science in Cyber Security Masters of Cyber Security
  • Advisory
    Security Awareness EC-Council Global Services
  • About
    Our Story
    • Executive Team
    • Governing Committees
    • Code Of Ethics
    • Diversity
    • Global Awards
    • Pressroom
    • Accreditations
    • Career
    • Contact Us
    Partner With Us
    • Become a Trainer
    • Become a Training Partner
    • Become an Academic Partner
    • Become a Reseller
    • Become a Subject Matter Expert
    • Become an EC-Council Advisory Board Member
    • Become a Conference Partner
    • Become a Media Partner
    RESOURCES
    • NICE Framework Mapping
    • Store
    • Certified Member Portal
    • Training Partner Portal
    • Have a Question
    THOUGHT LEADERSHIP
    • C|EH Hall of Fame 2023
    • C|EH Hall of Fame 2021-2022
    • C|CISO Hall of Fame 2023
    • Success Stories
    • Cybersecurity Exchange
    • Ethical Hacking Leaderboard
    CEHv13

Download brochure

Hall of Fame Report

CEH Assessment

1. Which term refers to gathering and publishing personally identifiable information?




2. What is the first hacking phase to gather information about a target?




3. Gathering sensitive information to damage a competitor is called?




4. Which scan disguises itself as normal traffic?




5. Changing source IPs to evade security controls?




6. Which Nmap scan is known as half-open?




7. Enumeration used to list domain computers?




8. SNMP command that notifies manager of events?




9. Assessment allowing different strategies per system?




10. Password attack using syllables?




11. CPU vulnerabilities due to speculative execution?




12. Rootkit modifying system boot?




13. Malware component preventing reverse engineering?




14. Virus intercepting OS calls?




15. Passive sniffing refers to?




16. Packet filtering firewall operates at?




17. Trojan used to deface websites?




18. ARP spoofing overloads which device?




19. Attack exploiting human behavior?




20. Offering help in exchange for credentials?




21. NOT computer-based social engineering?




22. Symptom of DoS attack?




23. NTP uses which port?




24. DDoS attack with no patch?




25. Partial HTTP requests exhausting server?




26. Injecting TCP data without seeing responses?




27. IDS alert when no attack exists?




28. IDS evasion using TTL values?




29. Software firewall is placed between?




30. Honeypot emulating real network?




31. Splitting attack traffic to evade IDS?




32. Metasploit module for scanning & fuzzing?




33. Injecting CR and LF characters?




34. Forcing browser to send unintended requests?




35. Using WAITFOR DELAY indicates?




36. Testing with full source code knowledge?




37. SQL injection altering database content?




38. Authentication bypass using OR condition?




39. Testing with massive random input?




40. Drawing symbols advertising Wi-Fi?




41. Wi-Fi standard at 5GHz, 54 Mbps?




42. Sending unsolicited Bluetooth messages?




43. Fake communication tower attack?




44. IoT layer handling routing & messaging?




45. IoT attack using multiple fake identities?




46. SOAP message duplication attack?




47. Docker network connecting container to host?




48. Code-breaking using social engineering?




49. Encryption using photon spin?




50. Extracting secrets via coercion?




Thank you for completing the
CEH Assessment!

We appreciate you taking the time to complete the CEH assessment.

Score:

Percentage:

A copy of your score has also been sent to your email inbox
We will connect with you shortly regarding the next steps.

Ready to become a Certified Ethical Hacker? Inquire Now!
EC-Council Logo

EC-Council was formed in 2001 after very disheartening research following the 9/11 attack on the World Trade Center. Founder and CEO of the EC-Council Group, Jay Bavisi, after watching the attacks unfold, raised the question, what if a similar attack were to be carried out on the cyber battlefield?

Read more...
Career Tracks
  • Vulnerability Assessment And Penetration Testing (VAPT)
  • Network Defense And Operation
  • Digital Forensic
  • Application Security
  • Incident Handling And Response
Trending Certifications
  • Certified Ethical Hacker (C|EH)
  • Certified Chief Information Security Officer (C|CISO)
  • Computer Hacking Forensic Investigator (C|HFI)
  • Certified Network Defender (C|ND)
  • Certified Incident Handler (E|CIH)
  • Certified Penetration Testing Professional (C|PENT)
  • Certified SOC Analyst (C|SA)
  • Certified Cybersecurity Technician (C|CT)
Customer Service
  • Partner With Us
  • Have A Question
  • Report Grievance
  • Training Partner Portal
  • Bug Bounty Program
  • Community
Company
  • About
  • Contact Us
  • Pressroom
  • Copyright 2024 © EC-Council All Rights Reserved
  • |
  • Partner With Us
  • |
  • Legal