CEH
"Challenge your ethical hacking skills with this CEH quiz! Test your knowledge on penetration testing, vulnerability assessment, network security, and cyber threats. Perfect for learners and professionals aiming to master ethical hacking concepts and stay ahead in cybersecurity."
fill the form !
1 / 20
Which hashing algorithm is considered obsolete and insecure?
2 / 20
What is the function of a vulnerability scanner?
3 / 20
Which of the following is a form of privilege escalation?
4 / 20
What is phishing?
5 / 20
What does the CIA triad stand for in cybersecurity?
6 / 20
What is the default port for HTTPS?
7 / 20
Which framework is commonly used for exploitation in ethical hacking?
8 / 20
What is the purpose of social engineering in hacking?
9 / 20
Which command in Linux is used to find open ports and services?
10 / 20
Which of the following is NOT a scanning technique?
11 / 20
What is the primary goal of ethical hacking?
12 / 20
Which phase involves gathering information without interacting directly with the target?
13 / 20
What does the term “white-hat hacker” refer to?
14 / 20
Which of the following tools is used for network scanning?
15 / 20
What does SQL injection exploit?
16 / 20
Which protocol is commonly used to securely transfer files?
17 / 20
Which cryptographic attack attempts every possible key combination?
18 / 20
Which tool is primarily used for packet sniffing?
19 / 20
What type of malware disguises itself as a legitimate program?
20 / 20
Which layer of the OSI model does a switch operate on?
Your score is
The average score is 0%
Restart quiz
WhatsApp us