Advertisement
Advertisement
Advertisement

CEH Quizzes & Trivia

Did you know that it’s possible to become a hacker for a living? It’s true! If you become a Certified Ethical Hacker (CEH) you can be hired as a trusted employee of an organization to penetrate networks and computer systems for the purpose of finding and fixing vulnerabilities.

It sounds like a pretty sweet gig. But do you have the skills necessary to obtain it? Who provides the professional certification to ethical hackers? What is the code for the CEH exam? How many questions are on the CEH exam? How much does it cost to take the exam?

What score do you need to pass the CEH exam? How often do certified hackers have to renew their certification? Ethical hacking is a little bit of a controversial subject. Where do you stand on the matter? Take these quizzes. They will help you form a solid and educated opinion.
Top Trending

Just a small bit from the CEH

Questions: 20  |  Attempts: 700   |  Last updated: Jul 30, 2011
  • Sample Question
    _____ is the pre-attack information gathering and organization of collected data, which is used to document the security profile of an organization.

This is your description.

Questions: 100  |  Attempts: 131   |  Last updated: Dec 19, 2018
  • Sample Question
    You are footprinting an organization and gathering competitive intelligence. You visit the company's website for contact information and telephone numbers but do not find them listed there. You know they had the entire staff directory listed on their website 12 months ago but now it is not there. Is there any way you can retrieve information from a website that is outdated?



Questions: 10  |  Attempts: 285   |  Last updated: Nov 30, 2016
  • Sample Question
    CEH stands for

This is your description.

Questions: 61  |  Attempts: 206   |  Last updated: Oct 31, 2013
  • Sample Question
    Jane wishes to forward X-Windows traffic to a remote host as well as POP3 traffic. She is worried that adversaries might be monitoring the communication link and could inspect captured traffic. She would like to tunnel the information to the remote end but does not have VPN capabilities to do so. Which of the following tools can she use to protect the link?

This is your description.

Questions: 100  |  Attempts: 269   |  Last updated: Oct 31, 2013
  • Sample Question
    Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing attacks?
Advertisement

Advertisement
You May Also Like: CEH Flashcards