This practice test covers Domain 4 (Network and Perimeter Hacking) Subdomain 2 (Social Engineering) from theΒ CEH v13 (312-50v13)Β exam blueprint (v5).

These questions are inspired by the EC-Council CEH exam and are designed to help you test your knowledge of ethical hacking tools, techniques, and methodologies. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CEH exam.

Note: CEH and Certified Ethical Hacker are registered trademarks of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CEH practice tests based on specific domains and subdomains, click that link.

CEH v13 Domain 4.2 Practice Test 002
10 questions β€’ 8 single-answer, 2 multi-select
Question 1
Clark crafts a convincing email appearing to originate from the company's IT helpdesk, instructing employees to click an embedded link and re-enter their VPN credentials on a lookalike corporate portal he controls. Thirty-two employees comply within two hours of the email's distribution, providing Clark with valid enterprise domain credentials. Which social engineering technique did Clark employ?
    Question 2
    A penetration tester calls the company's front desk and poses as an external auditor conducting a scheduled security review, using a fabricated scenario complete with a spoofed caller ID matching the audit firm's phone number and background research about current internal projects. The receptionist, believing the call is legitimate, provides the names and direct extensions of three senior IT administrators. Which social engineering technique did the penetration tester use?
      Question 3
      Jane calls an employee of a mid-size financial firm posing as a representative from the corporate IT security team, claiming the employee's workstation has generated suspicious alerts requiring immediate credential verification to prevent an imminent account lockout. The employee, pressured by urgency and the apparent authority of the caller, verbally provides their Active Directory username and password. Which attack technique did Jane execute?
        Question 4
        An enterprise security operations center detects that a current employee in the accounting department has been exfiltrating quarterly financial reports by emailing compressed attachments to a personal email account after business hours for the past six weeks. Investigation reveals the employee recently learned they were being passed over for promotion and had legitimate access privileges to all the files that were exfiltrated. Which insider threat category best describes this actor?
          Question 5
          Elijah targets a corporate campus with badge-controlled entry points and gains physical access to a restricted server room by closely following an authorized employee through the security door immediately after the employee swipes their badge, without presenting any access credential of his own. Once inside, Elijah plants a hardware keylogger on an unattended workstation before exiting the building. Which physical social engineering technique did Elijah employ?
            Question 6
            Select all that apply
            A newly appointed Chief Security Officer at a healthcare organization reviews a recent social engineering penetration test report revealing that employees disclosed credentials over the phone to testers posing as IT support, propped open badge-controlled doors for unknown individuals, and clicked phishing links at a 40% rate. The CSO must implement organizational controls to address all three identified weaknesses. Which TWO controls most directly reduce susceptibility to the social engineering techniques identified in the test? (Choose two)
              Question 7
              Kevin, a threat actor, spends three weeks monitoring a target organization's LinkedIn profiles and public project announcements to identify a finance manager's name, current project responsibilities, and the name of the external accounting firm the company retains. He then crafts a personalized email addressed to the finance manager by name, referencing the specific project, and purportedly sent by the accounting firm, with a malicious Excel attachment that deploys a RAT upon opening. How is Kevin's technique classified relative to standard phishing?
                Question 8
                An attacker creates a convincing LinkedIn profile using a photograph of a real employee at a target organization, adopting that employee's name, job title, and employer to appear as a trusted colleague. The attacker uses this fraudulent profile to send connection requests to other employees who accept, believing they are adding a known coworker, and then extracts project timelines, upcoming vendor contracts, and organizational headcount through direct messages. Which social engineering technique is the attacker employing?
                  Question 9
                  A security analyst reviews a case in which an attacker obtained a victim's name, Social Security number, and date of birth by purchasing a compiled data breach dataset from a dark web marketplace. The attacker then used those details to open three fraudulent credit card accounts and file a tax return in the victim's name, collecting a substantial refund before the fraud was detected. Which term accurately describes what the attacker committed after acquiring the victim's personal information?
                    Question 10
                    Select all that apply
                    A penetration tester explains to a client's board that advanced social engineering attacks sometimes use a reverse social engineering approach in which the attacker engineers a situation that causes the target to initiate contact and seek the attacker's help, rather than the attacker making first contact and risking detection or refusal. The tester describes the three recognized phases that comprise a complete reverse social engineering campaign. Which TWO of the following are established phases of a reverse social engineering attack? (Choose two)

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *