This practice test covers Domain 4 (Network and Perimeter Hacking) Subdomain 1 (Sniffing) from theΒ CEH v13 (312-50v13)Β exam blueprint (v5).

These questions are inspired by the EC-Council CEH exam and are designed to help you test your knowledge of ethical hacking tools, techniques, and methodologies. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CEH exam.

Note: CEH and Certified Ethical Hacker are registered trademarks of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CEH practice tests based on specific domains and subdomains, click that link.

CEH v13 Domain 4.1 Practice Test 002
10 questions β€’ 8 single-answer, 2 multi-select
Question 1
A penetration tester conducting an internal network assessment on a switched enterprise network intercepts traffic between two hosts by sending gratuitous ARP replies that associate her own MAC address with the IP addresses of both the gateway and a target workstation. Captured credentials flow through her Wireshark session as traffic is transparently forwarded between the two endpoints. Which attack technique did the penetration tester execute?
    Question 2
    Kevin, targeting a corporate LAN, uses macof to flood a core switch with thousands of frames containing random source MAC addresses until the switch's Content Addressable Memory table is completely exhausted. Once the CAM table overflows, the switch begins broadcasting all incoming frames out every port rather than forwarding them only to the intended destination. What is the primary objective of Kevin's attack?
      Question 3
      A network analyst explains to a junior colleague that sniffing on a hub-based network requires no packet injection because all traffic is broadcast to every connected port by default. On a switched network, however, the analyst notes that techniques such as ARP poisoning or MAC flooding must be used to redirect traffic to the attacker's interface before it can be captured. Which statement correctly distinguishes passive sniffing from active sniffing?
        Question 4
        Jane executes a DHCP starvation attack against an enterprise network by flooding the DHCP server with DISCOVER messages using thousands of spoofed MAC addresses, exhausting the entire available address pool. She then stands up her own rogue DHCP server and begins responding to new client DISCOVER requests with IP configuration that designates her host as the default gateway. What is the ultimate goal of Jane's two-phase attack?
          Question 5
          A security analyst opens a packet capture file and immediately applies the display filter 'http.request.method == POST' to isolate web form submissions containing potential cleartext credentials. The tool's protocol dissection engine decodes each captured session layer by layer, displaying structured field values for HTTP headers, cookies, and POST body parameters. Which network analysis tool is the analyst using?
            Question 6
            An enterprise security team investigating a wave of user redirections to fraudulent banking sites discovers that an internal DNS resolver began returning attacker-controlled IP addresses for legitimate financial domains after an on-path attacker on the same LAN segment sent forged UDP responses that arrived before the legitimate authoritative server's replies. The resolver accepted the forged records because it lacked source port randomization and DNSSEC validation, and the fraudulent entries persisted in cache until their TTL expired. Which attack did the enterprise network suffer?
              Question 7
              Select all that apply
              Elijah, a security engineer, discovers that an attacker inside the corporate LAN executed a successful ARP poisoning campaign that redirected executive traffic through a rogue host for three days without detection. Elijah is tasked with implementing controls that will prevent this class of attack from recurring on the organization's Cisco switched infrastructure. Which TWO controls should Elijah implement to mitigate ARP poisoning on the switched network? (Choose two)
                Question 8
                Clark is conducting a red team exercise and crafts raw Ethernet frames with a spoofed source MAC address belonging to the organization's default gateway router, sending these frames to hosts on the target VLAN to corrupt their ARP caches and impersonate the gateway. Hosts update their ARP tables and begin forwarding all outbound traffic to Clark's interface, which he transparently proxies after capturing credentials with Wireshark. What category of active sniffing technique did Clark employ?
                  Question 9
                  A security analyst suspects that an insider threat has deployed a packet sniffer on the internal network by placing a host's NIC in promiscuous mode to capture all traffic crossing the segment. The analyst crafts a specially formed ICMP echo request with a valid destination IP address but an incorrect unicast destination MAC address that does not match the target host, reasoning that a host with a normal NIC driver would discard the frame while a host in promiscuous mode would pass it to the IP stack and respond. Which detection technique is the analyst applying?
                    Question 10
                    Select all that apply
                    A newly appointed network security architect at a financial institution audits the organization's defenses against sniffing attacks and discovers that administrative sessions use Telnet and FTP, and internal web applications transmit login credentials over HTTP without TLS. The architect must recommend controls that directly reduce the risk of credential capture by an attacker who has already achieved a man-in-the-middle position on the network. Which TWO controls most directly mitigate credential interception via sniffing? (Choose two)

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *