Welcome to this CEH v13 practice test!

This practice test covers Domain 2 (Reconnaissance Techniques) Subdomain 1 (Footprinting and Reconnaissance) from the CEH v13 (312-50v13) exam blueprint (v5).

These questions are inspired by the EC-Council CEH exam and are designed to help you test your knowledge of ethical hacking tools, techniques, and methodologies. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CEH exam.

Note: CEH and Certified Ethical Hacker are registered trademarks of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CEH practice tests based on specific domains and subdomains, click that link.

CEH v13 Domain 2.1 Practice Test 002
10 questions • 8 single-answer, 2 multi-select
CEH v13 (312-50v13) • Domain 2: Reconnaissance Techniques — Sub-Domain 2.1: Footprinting and Reconnaissance
Question 1
A penetration tester gathers information about a target organization using public sources such as websites, social media, and search engines without directly interacting with the target systems. What type of reconnaissance technique is being used?
    Question 2
    During reconnaissance, a tester uses the 'whois' command to gather domain registration details such as registrar, contact email, and expiration date. What type of information is primarily obtained through this technique?
      Question 3
      An ethical hacker uses a tool to gather email addresses associated with a domain by querying public search engines and DNS servers. Which tool is most commonly used for this purpose?
        Question 4
        A tester queries DNS servers to retrieve records such as A, MX, and NS records for a target domain. What reconnaissance technique is being performed?
          Question 5
          An attacker uses Google search operators such as 'site:' and 'filetype:' to find sensitive documents exposed online. What technique is this known as?
            Question 6
            Select all that apply
            A penetration tester is performing footprinting on a target organization. Which TWO sources are commonly used for passive information gathering? (Choose two)
              Question 7
              An ethical hacker uses Maltego to map relationships between domains, IP addresses, and email addresses. What type of reconnaissance activity is this?
                Question 8
                A tester attempts to gather information by sending ICMP echo requests to determine which hosts are active on a network. What type of reconnaissance is this?
                  Question 9
                  An attacker gathers employee email addresses and uses them to craft phishing campaigns. Which phase of ethical hacking does this activity support?
                    Question 10
                    Select all that apply
                    During footprinting, which TWO types of information are most valuable for an attacker to collect? (Choose two)

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *