Certified Ethical Hacker (CEH) V12 Exam Version 1 (Latest Update 2025 / 2026) Questions and Answers | Grade A | 100% Correct
Question:
What is a set of extensions to DNS that provide to DNS clients (resolvers) origin authentication, authenticated denial of existence and data integrity, but not availability or confidentiality?
Answer:
DNSSEC
Question:
What means the flag "-oX" in a Nmap scan?
Answer:
Output the results in XML format to a file.
- / 4
Question:
Which of the following application security testing method of white-box testing, in which only the source code of applications and their components is scanned for determines potential vulnerabilities in their software and architecture?
Answer:
SAST
Question:
What best describes two-factor authentication for a credit card (using a card and pin)?
Answer:
Something you have and something you know.
Question:
Which of the following is an encryption technique where data is encrypted by a sequence of photons that have a spinning trait while travelling from one end to another?
Answer:
Quantum Cryptography.
- / 4
Question:
With which of the following SQL injection attacks can an attacker deface a web page, modify or add data stored in a database and compromised data integrity?
Answer:
Compromised Data Integrity.
Question:
Determine the attack by the description:
Determine the attack by the description: The known-plaintext attack used
against DES. This attack causes that encrypting plaintext with one DES key followed by encrypting it with a second DES key is no more secure than using a single key.
Answer:
Meet-in-the-middle attack
Question:
Which one of the following Google search operators allows restricting results to those from a specific website?
Answer:
[site:]
- / 4
Question:
Which of the following best describes code injection?
Answer:
Form of attack in which a malicious user inserts text into a data field interpreted as code.
Question:
What actions should be performed before using a Vulnerability Scanner for scanning a network?
Answer:
Checking if the remote host is alive.
Question:
Which of the following is a protocol that used for querying databases that store the registered users or assignees of an Internet resource, such as a domain name, an IP address block or an autonomous system?
Answer:
WHOIS
- / 4