CEH Quizzes & Trivia

Did you know that it’s possible to become a hacker for a living? It’s true! If you become a Certified Ethical Hacker (CEH) you can be hired as a trusted employee of an organization to penetrate networks and computer systems for the purpose of finding and fixing vulnerabilities.

It sounds like a pretty sweet gig. But do you have the skills necessary to obtain it? Who provides the professional certification to ethical hackers? What is the code for the CEH exam? How many questions are on the CEH exam? How much does it cost to take the exam?

What score do you need to pass the CEH exam? How often do certified hackers have to renew their certification? Ethical hacking is a little bit of a controversial subject. Where do you stand on the matter? Take these quizzes. They will help you form a solid and educated opinion.

Just a small bit from the CEH

Questions: 20  |  Attempts: 200   |  Last updated: Jul 30, 2011
  • Sample Question
    _____ is the pre-attack information gathering and organization of collected data, which is used to document the security profile of an organization.

Ethical hacking and Countermeasures

Questions: 5  |  Attempts: 131   |  Last updated: Nov 30, 2016
  • Sample Question
    Which of the following countermeasures can specifically protect agianst both the MAC flood and MAC spoofing attacks?



Questions: 10  |  Attempts: 72   |  Last updated: Nov 30, 2016
  • Sample Question
    CEH stands for

This is your description.

Questions: 100  |  Attempts: 50   |  Last updated: Oct 31, 2013
  • Sample Question
    Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing attacks?

This is your description.

Questions: 61  |  Attempts: 24   |  Last updated: Oct 31, 2013
  • Sample Question
    Jane wishes to forward X-Windows traffic to a remote host as well as POP3 traffic. She is worried that adversaries might be monitoring the communication link and could inspect captured traffic. She would like to tunnel the information to the remote end but does not have VPN capabilities to do so. Which of the following tools can she use to protect the link?




You May Also Like: CEH Flashcards