Welcome to this CEH v13 practice test!

This practice test covers Domain 9 (Cryptography) Subdomain 1 (Cryptography) from the CEH v13 (312-50v13) exam blueprint (v5).

These questions are inspired by the EC-Council CEH exam and are designed to help you test your knowledge of ethical hacking tools, techniques, and methodologies. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CEH exam.

Note: CEH and Certified Ethical Hacker are registered trademarks of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CEH practice tests based on specific domains and subdomains, click that link.

CEH v13 Domain 9.1 Practice Test 001
10 questions • 8 single-answer, 2 multi-select
CEH v13 (312-50v13) • Domain 9: Cryptography — Sub-Domain 9.1: Cryptography
Question 1
An ethical hacker is analyzing encrypted traffic captured from a network. The encryption uses the same key for both encryption and decryption operations. Which type of cryptographic system is being used in this scenario?
    Question 2
    During a penetration test, a tester captures password hashes from a compromised system and attempts to recover the original passwords using precomputed tables. What technique is the tester using?
      Question 3
      A security analyst observes that a system is using MD5 to store user passwords. Why is this considered insecure in modern environments?
        Question 4
        An attacker intercepts encrypted communication and attempts to decrypt it by trying every possible key until the correct one is found. What type of attack is this?
          Question 5
          A penetration tester is evaluating SSL/TLS implementation and discovers that the server supports outdated protocols such as SSLv3. What is the primary risk associated with this configuration?
            Question 6
            Select all that apply
            An ethical hacker is analyzing password storage mechanisms. Which TWO practices significantly improve password security? (Choose two)
              Question 7
              A digital certificate is used to verify the identity of a website. Which component of the certificate ensures that it was issued by a trusted authority?
                Question 8
                An attacker captures an encrypted message and later retransmits it to trick the receiver into performing an action again. What type of cryptographic attack is this?
                  Question 9
                  A penetration tester identifies that a web application uses predictable initialization vectors (IVs) in its encryption scheme. What vulnerability does this introduce?
                    Question 10
                    Select all that apply
                    A security team is implementing cryptographic controls. Which TWO techniques help ensure data integrity? (Choose two)

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *