Certified Ethical Hacker (CEH) V12 Exam Version 3 (Latest Update 2025 / 2026) Simulated Test Questions and Answers | Grade A | 100% Correct
Question:
Through which of the following techniques can an attacker obtain a computer's IP address, alter the packet headers, and send request packets to a target machine while pretending to be a legitimate host?
A IP address decoy B Source port manipulation C Packet fragmentation D IP address spoofing
Answer:
D IP address spoofing
- / 4
Question:
Ben, an ethical hacker, was hired by an organization to check its security levels. In the process, Ben examined the network from a hacker's perspective to identify exploits and vulnerabilities accessible to the outside world by using devices such as firewalls, routers, and servers.Which of the following types of vulnerability assessment did Ben perform on the organization?A Active assessment B Passive assessment C External assessment D Internal assessment
Answer:
C External assessment
Question:
Which of the following types of vulnerability assessment sniffs the traffic present on the network to identify the active systems, network services, applications, and vulnerabilities?A Active assessment B Passive assessment C Credentialed assessment D Distributed assessment
Answer:
B Passive assessment 2 / 4
Question:
Which of the following components of public key infrastructure acts as a verifier for the certificate authority?
A Authentication authority B Registration authority C Certificate management system D Validation authority
Answer:
B Registration authority
Question:
Which of the following is an evasion technique that involves replacing characters with their ASCII codes in hexadecimal form and prefixing each code point with the percent sign (%)?
A URL encoding B Sophisticated matches C Null byte D Case variation
Answer:
A URL encoding
- / 4
Question:
Given below are the different steps involved in exploiting vulnerabilities.
Develop the exploit.Determine the risk associated with the vulnerability.Determine the capability of the vulnerability.Identify the vulnerability.Gain remote access.
Select the method for delivering: local or remote.
Generate and deliver the payload.
What is the correct sequence of steps involved in exploiting vulnerabilities?
A 1 → 2 → 3 → 4 → 5 → 6 → 7
B 3 → 6 → 7 → 4 → 2 → 1 → 5
C 2 → 3 → 6 → 4 → 5 → 1 → 7
D 4 → 2 → 3 → 1 → 6 → 7 → 5
Answer:
D 4 → 2 → 3 → 1 → 6 → 7 → 5
- / 4