This practice test covers Domain 4 (Network and Perimeter Hacking) Subdomain 5 (Evading IDS, Firewalls, and Honeypots) from the CEH v13 (312-50v13) exam blueprint (v5).

These questions are inspired by the EC-Council CEH exam and are designed to help you test your knowledge of ethical hacking tools, techniques, and methodologies. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CEH exam.

Note: CEH and Certified Ethical Hacker are registered trademarks of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CEH practice tests based on specific domains and subdomains, click that link.

CEH v13 Domain 4.5 Practice Test 002
10 questions • 8 single-answer, 2 multi-select
Question 1
Clark is performing a penetration test against an enterprise network protected by a signature-based IDS and attempts to evade detection by breaking his Nmap scan into tiny packet fragments so that no single packet contains enough of the TCP header to match any known attack signature. The IDS fails to reassemble the fragments and does not alert on the activity. Which IDS evasion technique did Clark use?
    Question 2
    A security analyst reviewing firewall logs notices that an external attacker consistently sends HTTP requests with the destination port 80 but encapsulates a reverse shell command inside the HTTP payload, allowing the shell traffic to pass through the perimeter firewall unblocked. The firewall is configured to allow inbound TCP port 80 traffic to the DMZ web server without deep packet inspection. Which firewall evasion technique does this describe?
      Question 3
      Jane is performing a red team engagement and uses Nmap with the -D option followed by several decoy IP addresses to make her real scan traffic indistinguishable from spoofed probes originating from multiple sources. The IDS at the target organization generates dozens of simultaneous alerts from different IPs but cannot determine which source is the legitimate attacker. Which IDS evasion technique is Jane employing?
        Question 4
        Select all that apply
        An OT security team deploys a honeypot on their industrial control network that mimics a vulnerable SCADA HMI interface to lure potential attackers and gather threat intelligence on adversary tactics. During the monitoring period, they detect an attacker who enumerated the fake HMI using Shodan and Nmap before realizing the system showed signs of being a trap and abruptly ceased interaction. Which TWO indicators would MOST reliably suggest to an attacker that the system is a honeypot rather than a production asset? (Choose two)
          Question 5
          Elijah is conducting an authorized penetration test against a financial institution's web application and uses Burp Suite to insert invalid UTF-8 byte sequences and double-encoded percent signs in the URL path before forwarding requests to the backend web server, successfully bypassing the WAF that strips only single-pass decoded attack strings. The backend server normalizes the URL a second time and processes the injected payload. Which evasion technique did Elijah apply?
            Question 6
            A penetration tester assessing a hardened enterprise perimeter uses hping3 to craft TCP packets with the ACK flag set and a destination port of 443, then analyzes which packets elicit RST responses from hosts inside the network to determine which IP addresses are alive behind the stateful firewall. The firewall passes ACK packets because they appear to belong to established sessions. Which scanning technique is the tester using to bypass the firewall?
              Question 7
              Kevin is performing a wireless penetration test against a corporate network and discovers that the IDS is configured to alert on any traffic matching known Metasploit module signatures. He modifies his exploit payload using a custom XOR encoder in msfvenom to change the byte pattern of the shellcode with each generation, ensuring no two payloads have the same binary signature. Which IDS evasion technique is Kevin using?
                Question 8
                A red team operator is testing an enterprise network where the perimeter firewall blocks all inbound traffic except DNS responses on UDP port 53. The operator establishes a command-and-control channel by encoding commands as subdomains of a domain she controls and receiving data back in DNS TXT records, completely bypassing firewall rules that only inspect layer 3 and layer 4 headers. Which firewall evasion technique is she using?
                  Question 9
                  Select all that apply
                  During a cloud-based penetration test, a security team discovers that the target organization's web application firewall is deployed in detection-only mode and is not blocking any traffic. The team identifies the WAF's presence by sending deliberately malformed HTTP requests and comparing response latency and error messages against those from an unprotected endpoint. Which TWO methods are MOST commonly used to detect the presence of a WAF in front of a web application? (Choose two)
                    Question 10
                    An IDS analyst notices that an attacker's TCP stream contains overlapping fragments where both the IDS and the target host receive the same fragments but reassemble them differently due to conflicting overlap resolution policies, causing the IDS to reconstruct a benign byte sequence while the target host processes the actual malicious payload. Which IDS evasion category does this attack fall under?

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *