Welcome to this CEH v13 practice test!

This practice test covers Domain 1 (Information Security and Ethical Hacking Overview) Subdomain 1 (Introduction to Ethical Hacking) from the CEH v13 (312-50v13) exam blueprint (v5).

These questions are inspired by the EC-Council CEH exam and are designed to help you test your knowledge of ethical hacking tools, techniques, and methodologies. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CEH exam.

Note: CEH and Certified Ethical Hacker are registered trademarks of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CEH practice tests based on specific domains and subdomains, click that link.

CEH v13 Domain 1.1 Practice Test 002
10 questions • 8 single-answer, 2 multi-select
CEH v13 (312-50v13) • Domain 1: Information Security and Ethical Hacking Overview — Sub-Domain 1.1: Introduction to Ethical Hacking
Question 1
An organization hires a security professional to simulate real-world attacks without prior knowledge of the internal systems. The tester is only given the company name and must gather all other information independently. What type of penetration testing approach is being used?
    Question 2
    During an engagement, a tester discovers a vulnerability but chooses not to exploit it to avoid disrupting production systems. Instead, the tester documents the finding and provides recommendations. Which ethical hacking principle is being demonstrated?
      Question 3
      A security professional signs a contract outlining the scope, rules, and permissions for conducting a penetration test. What is this document commonly called?
        Question 4
        An attacker exploits vulnerabilities without permission and for personal gain, often causing harm to systems. What type of hacker is this classified as?
          Question 5
          A penetration tester is performing reconnaissance by gathering publicly available information such as company websites, employee details, and DNS records. What phase of ethical hacking does this activity belong to?
            Question 6
            Select all that apply
            An organization is defining ethical hacking practices. Which TWO responsibilities are essential for ethical hackers? (Choose two)
              Question 7
              A company hires a tester to evaluate its defenses by simulating an insider threat with limited system knowledge. What type of testing is this?
                Question 8
                During an engagement, a tester ensures that all actions are logged and reported accurately to the client. Which principle is being followed?
                  Question 9
                  An ethical hacker is required to sign a legal agreement ensuring that sensitive information obtained during testing is not disclosed. What is this agreement called?
                    Question 10
                    Select all that apply
                    A penetration tester is preparing for an engagement. Which TWO activities should be completed before starting the test? (Choose two)

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *