Welcome to this CEH v13 practice test!

This practice test covers Domain 1 (Information Security and Ethical Hacking Overview) from the CEH v13 (312-50v13) exam blueprint (v5).

These questions are inspired by the EC-Council CEH exam and are designed to help you test your knowledge of ethical hacking tools, techniques, and methodologies. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CEH exam.

Note: CEH and Certified Ethical Hacker are registered trademarks of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CEH practice tests based on specific domains and subdomains, click that link.

CEH Domain 1 Practice Test 01
10 questions • 8 single-answer, 2 multi-select
CEH v13 (312-50v13) • CEH Domain 1 Practice Test 01
Question 1
A security professional is explaining the differences between various threat actor categories to a junior analyst. The professional describes a group that is sponsored by a nation-state, operates with significant funding and resources, and focuses on long-term espionage rather than immediate financial gain. Which type of threat actor is being described?
    Question 2
    Which of the following best describes the CIA Triad and its relevance to information security?
      Question 3
      Kevin, a professional hacker, is preparing to conduct an authorized penetration test against a financial institution. Before beginning any active testing, Kevin obtains a signed document from the client that defines the scope, rules of engagement, systems in scope, and legal protections for both parties. What is this document called?
        Question 4
        During a security awareness training session, an instructor outlines the five phases of the ethical hacking methodology in correct sequential order. Which of the following represents the correct sequence?
          Question 5
          An organization implements a security control that does not prevent an attack from occurring but instead records all activity, generates alerts, and produces forensic evidence after a breach has taken place. Which category of security control does this describe?
            Question 6
            Select all that apply
            Clark, a penetration tester, is reviewing the legal and regulatory landscape before conducting a test for a healthcare client in the United States. The client processes protected health information (PHI) and also accepts credit card payments. Which two laws or standards are MOST directly applicable to this client's environment and should be considered during the engagement? (Select two.)
              Question 7
              Which of the following statements most accurately distinguishes a vulnerability from an exploit in the context of information security?
                Question 8
                Jane is working as an ethical hacker and is conducting a penetration test in which the client has provided her with full knowledge of the internal network architecture, IP schema, source code, and credentials. What type of penetration test is Jane performing?
                  Question 9
                  An organization wants to implement a proactive security model rather than a purely reactive one. A security architect proposes adopting a framework that shifts the assumption from 'the network is safe' to 'never trust, always verify,' requiring continuous authentication and least-privilege access for all users and devices regardless of network location. Which security model is being described?
                    Question 10
                    Select all that apply
                    A security manager is implementing information security controls for a mid-sized enterprise. She wants to ensure that controls are categorized properly according to their function. Which TWO of the following are examples of administrative (managerial) controls? (Select two.)

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *