Welcome to this CEH v13 practice test!

This practice test covers Domain 2 (Reconnaissance Techniques) Subdomain 3 (Enumeration) from the CEH v13 (312-50v13) exam blueprint (v5).

These questions are inspired by the EC-Council CEH exam and are designed to help you test your knowledge of ethical hacking tools, techniques, and methodologies. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CEH exam.

Note: CEH and Certified Ethical Hacker are registered trademarks of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CEH practice tests based on specific domains and subdomains, click that link.

CEH v13 Domain 2.3 Practice Test 001
10 questions • 8 single-answer, 2 multi-select
CEH v13 (312-50v13) • Domain 2: Reconnaissance Techniques — Sub-Domain 2.3: Enumeration
Question 1
A penetration tester is assessing a Windows-based enterprise network and wants to extract a list of user accounts, shared resources, and group memberships from a target system without valid credentials. The tester attempts to establish a null session to the target using the IPC$ share. Which protocol is being leveraged to perform this enumeration technique?
    Question 2
    Clark, a professional hacker, has gained access to a network and is attempting to enumerate SNMP-enabled devices. He uses a tool to send SNMP requests with the community string "public" and successfully retrieves routing tables, ARP caches, and interface information from multiple routers. Which tool did Clark most likely use to perform this enumeration?
      Question 3
      Select all that apply
      During a network security audit, an analyst discovers that an attacker has been sending SMTP commands to a mail server to harvest valid email addresses from the organization. The attacker used commands that prompted the server to reveal whether specific addresses exist. Which two SMTP commands are most commonly abused for this type of user enumeration? (Choose two.)
        Question 4
        Jane is conducting a black-box penetration test against a target organization's domain infrastructure. She runs the following command and receives a zone transfer response containing all DNS records for the target domain: dig axfr @ns1.targetcorp.com targetcorp.com. What type of enumeration has Jane performed, and what is the primary security risk of this misconfiguration?
          Question 5
          Elijah, a penetration tester, is enumerating an Active Directory environment. He uses the following command to extract information from the target: ldapsearch -x -h 192.168.1.10 -b "dc=corp,dc=local" "(objectClass=user)". What type of enumeration is Elijah performing, and what information is he most likely attempting to retrieve?
            Question 6
            A security team detects unusual NTP traffic originating from an internal host directed at the organization's NTP servers. Upon investigation, they determine the host is sending monlist requests to the NTP server. Beyond DDoS amplification, what reconnaissance information can an attacker extract using the NTP monlist command?
              Question 7
              Kevin is performing enumeration on a target Linux server and runs the following command: rpcclient -U "" -N 192.168.10.5. After connecting, he issues the enumdomusers command. What is Kevin enumerating, and what prerequisite condition must be true for this technique to succeed?
                Question 8
                Select all that apply
                During an engagement, a pen tester uses the enum4linux tool against a target Windows host and retrieves password policy information, share listings, and a full user list. Which two underlying protocols does enum4linux primarily leverage to perform this enumeration? (Choose two.)
                  Question 9
                  An ethical hacker is performing an SNMP enumeration assessment against a target network. She discovers that a Cisco router is running SNMPv1 with the default community string "public." She wants to enumerate the full routing table from this device. Which of the following represents the correct OID (Object Identifier) branch she should walk to retrieve IP routing table information from the MIB?
                    Question 10
                    A penetration tester is assessing an organization's IPv6-enabled network segment. She wants to enumerate active hosts on the local link without sending traditional ICMP echo requests. She crafts a packet to the IPv6 all-nodes multicast address and observes responses. Which enumeration technique is she using, and what is the relevant IPv6 multicast address for all nodes on the local link?

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *