Certified Ethical Hacker (CEH) V12 Exam Version 4 (Latest Update 2025 / 2026) Simulated Test Questions and Answers | Grade A | 100% Correct
Question:
Melanie, a new employee in an organization, noted down her passwords in a document and saved it to the cloud. Brett, a professional hacker who targeted the organization, succeeded in accessing the file uploaded by Melanie and gathering sensitive information of the organization.
Which of the following categories of insiders does Melanie belong to?
Answer:
Negligent insider
Question:
What results will the following command yield: nmap -sS -O -p 123-153
192.168.100.3?
Answer:
A stealth scan, determine operating system, and scanning ports 123 to 153 1 / 4
Question:
A hacker is attempting to use nslookup to query domain name service (DNS).The hacker uses the nslookup interactive mode for the search. Which command should the hacker type into the command shell to request the appropriate records?
Answer:
Set type=ns
Question:
Which of the following availability attacks involve exploiting the CSMA/CA Clear Channel Assessment (CCA) mechanism to make a channel appear busy?
Answer:
Denial-of-Service
Question:
Which of the following regional internet registries (RIRs) provides services related to the technical coordination and management of Internet number resources in Canada, the United States, and many Caribbean and North Atlantic islands?
Answer:
ARIN
- / 4
Question:
Which of the following MIBs manages the TCP/IP-based Internet using a simple architecture and system?
Answer:
MIB_II.MIB
Question:
Given below are the different phases of the vulnerability management lifecycle.
- Monitor
- Vulnerability scan
- Identify assets and create a baseline
- Risk assessment
- Verification
- Remediation
What is the correct sequence of phases involved in the vulnerability management lifecycle?
Answer:
3 2 4 6 5 1
- / 4
Question:
In which of the following attack techniques does an attacker exploit an NFC- enabled Android device by establishing a remote connection with the target mobile device and taking full control of the device?
Answer:
Tap 'n Ghost attack
Question:
A hacker is attempting to see which protocols are supported by target machines or network. Which NMAP switch would the hacker use?
Answer:
-sO
Question:
Fred, a professional hacker, was hired to perform a series of attacks on an organization. In this process, he injected a type of malware on a computer to secretly gather information about its users without their knowledge.
Which of the following types of malware did Fred inject into the target computer?
Answer:
Spyware
- / 4