Welcome to this CEH v13 practice test!

This practice test covers Domain 2 (Reconnaissance Techniques) Subdomain 2 (Scanning Networks) from the CEH v13 (312-50v13) exam blueprint (v5).

These questions are inspired by the EC-Council CEH exam and are designed to help you test your knowledge of ethical hacking tools, techniques, and methodologies. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CEH exam.

Note: CEH and Certified Ethical Hacker are registered trademarks of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CEH practice tests based on specific domains and subdomains, click that link.

CEH v13 Domain 2.2 Practice Test 001
10 questions • 8 single-answer, 2 multi-select
CEH v13 (312-50v13) • 2. Reconnaissance Techniques
Question 1
A penetration tester needs to perform a stealthy port scan against a target host without completing the TCP three-way handshake. The tester wants to reduce the chance of the scan being logged by the target system's connection tracking. Which Nmap scan type should the tester use?
    Question 2
    During a network security audit, an analyst observes the following Nmap command being executed against a target subnet: `nmap -sn 10.10.0.0/24`. The analyst needs to understand what this command accomplishes and what its limitations are. What is the PRIMARY purpose of this scan, and what does it NOT do?
      Question 3
      Select all that apply
      Clark, a professional hacker, is targeting a financial organization and wants to identify open ports and running services while also determining the operating system of each live host. He runs the following command: `nmap -A -T4 -p 1-1024 192.168.10.0/24`. Which of the following capabilities does the -A flag enable in this scan? (Choose two)
        Question 4
        A security team is reviewing firewall rules and wants to determine which ports are filtered versus closed on a remote host. An ethical hacker on the team suggests using an Nmap scan that sends packets with no TCP flags set. Which scan type is being described, and what is the expected response from a closed port?
          Question 5
          Jane is conducting a black-box penetration test and needs to determine the operating system of a target host at IP address 172.16.5.10. She cannot rely on open ports returning banner information. Which Nmap technique should Jane use to passively fingerprint the OS based on TCP/IP stack behavior?
            Question 6
            During an engagement, a pen tester uses hping3 to craft and send custom packets to a target. The tester executes the following command: `hping3 -S -p 80 --scan 1-1000 192.168.5.5`. Which of the following best describes what this command accomplishes, and how does it differ from an equivalent Nmap SYN scan?
              Question 7
              A penetration tester wants to scan a target network but needs to avoid triggering rate-based IDS alerts. The tester decides to slow the scan speed significantly. Which Nmap timing template should the tester use to send packets at a rate slow enough to blend with normal background traffic?
                Question 8
                Elijah, a network security analyst, is reviewing packet captures and notices the following pattern: a single external IP address sent SYN packets to 500 different destination ports on a server within a 2-second window, received RST/ACK responses on most ports, and received SYN/ACK on three ports. No connections were completed. What type of scan has Elijah most likely detected, and which tool is most commonly associated with this technique?
                  Question 9
                  An ethical hacker is performing banner grabbing against a web server to identify the software version running on port 80. The tester uses the following command: `telnet 10.0.0.5 80`. After connecting, the tester types `HEAD / HTTP/1.0` and presses Enter twice. The server responds with HTTP headers including the `Server:` field. What type of banner grabbing is this, and what is a key limitation of this technique?
                    Question 10
                    Select all that apply
                    A penetration tester needs to scan a target host that is behind a stateful firewall configured to block inbound SYN packets. The tester wants to use a scanning technique that exploits how stateful firewalls track TCP sessions to potentially identify open ports. Which scan type should the tester use? (Choose two)

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *