CEH Quizzes Online & Trivia

A comprehensive database of CEH quizzes online, test your knowledge with CEH quiz questions. Our online CEH trivia quizzes can be adapted to suit your requirements for taking some of the top CEH quizzes.

Did you know that it’s possible to become a hacker for a living? It’s true! If you become a Certified Ethical Hacker (CEH) you can be hired as a trusted employee of an organization to penetrate networks and computer systems for the purpose of finding and fixing vulnerabilities.

It sounds like a pretty sweet gig. But do you have the skills necessary to obtain it? Who provides the professional certification to ethical hackers? What is the code for the CEH exam? How many questions are on the CEH exam? How much does it cost to take the exam?

What score do you need to pass the CEH exam? How often do certified hackers have to renew their certification? Ethical hacking is a little bit of a controversial subject. Where do you stand on the matter? Take these quizzes. They will help you form a solid and educated opinion.

Related Topics


  • _____ is the pre-attack information gathering and organization of collected data, which is used to document the security profile of an organization.
    CEH question from

  • Identify the 3 pre-attack phases
    CEH question from

  • the information gathering stage has ___ phases
    CEH question from

  • Which of the following countermeasures can specifically protect agianst both the MAC flood and MAC spoofing attacks?

  • Jimmy, an attacker, knows that he can take advantage of poorly designed input validiation routines to create or alter SQL commands to gain access to private data or execute commands in the database.  What technique does jimmy use to compromise a database?

  • This IDS defeating technique works by splitting a datagram (or packet) into multiple fragments and the IDS will not spot the true nature of the fully assembled datagram.  The datagram is not reassembled until is reaches its final destination.  It would be a processor-intensive task for the IDS to reassemble fragments itself, and on a busy system the packet will slip through the IDS onto the network.  What is this technique called?

  • CEH stands for
    CEH question from

  • The latest version of CEH is
    CEH question from

  • The highest paying salaries in Melbourne are for
    CEH question from

  • Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing attacks?
    CEH question from

  • Jimmy, an attacker, knows that he can take advantage of poorly designed input validation routines to create or alter SQL commands to gain access to private data or execute commands in the database. What technique does Jimmy use to compromise a database?
    CEH question from

  • This IDS defeating technique works by splitting a datagram (or packet) into multiple fragments and the IDS will not spot the true nature of the fully assembled datagram. The datagram is not reassembled until it reaches its final destination. It would be a processor-intensive task for IDS to reassemble all fragments itself, and on a busy system the packet will slip through the IDS onto the network. What is this technique called?
    CEH question from