Welcome to this CEH v13 practice test!

This practice test covers Domain 6 (Wireless Network Hacking) Subdomain 1 (Hacking Wireless Networks) from the CEH v13 (312-50v13) exam blueprint (v5).

These questions are inspired by the EC-Council CEH exam and are designed to help you test your knowledge of ethical hacking tools, techniques, and methodologies. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CEH exam.

Note: CEH and Certified Ethical Hacker are registered trademarks of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CEH practice tests based on specific domains and subdomains, click that link.

CEH v13 Domain 6.1 Practice Test 001
10 questions • 8 single-answer, 2 multi-select
CEH v13 (312-50v13) • Domain 6: Wireless Network Hacking — Sub-Domain 6.1: Hacking Wireless Networks
Question 1
During a wireless assessment, Kevin observes multiple clients suddenly disconnect from a WPA2 network and immediately reconnect. Shortly after, he captures a 4-way handshake. What technique was most likely used to trigger this event?
    Question 2
    An attacker sets up a wireless access point with the same SSID as a legitimate corporate network. Employees unknowingly connect and submit login credentials to a fake portal. What attack is being performed?
      Question 3
      Lisa captures encrypted wireless traffic and attempts to crack a WPA2 password using a wordlist against the captured handshake. What type of attack is she performing?
        Question 4
        A wireless auditor discovers that a network is using WEP encryption. What fundamental weakness allows attackers to recover the encryption key?
          Question 5
          An attacker captures wireless packets and retransmits them to gain unauthorized access or generate traffic. What type of attack does this describe?
            Question 6
            Select all that apply
            A wireless engineer is trying to identify hidden SSIDs in a network. Which TWO techniques can reveal the hidden network name? (Choose two)
              Question 7
              A company upgrades its wireless security to WPA3. What key feature improves resistance against offline password attacks?
                Question 8
                An attacker changes their wireless adapter’s MAC address to match a trusted device on the network. What technique is being used?
                  Question 9
                  A user connects to a public Wi-Fi hotspot and is redirected to a fake login page that captures credentials. What type of attack is this?
                    Question 10
                    Select all that apply
                    A network administrator reviews wireless security posture. Which TWO weaknesses significantly increase the risk of wireless compromise? (Choose two)

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *