Welcome to this CEH v13 practice test!

This practice test covers Domain 3 (System Hacking Phases and Attack Techniques) Subdomain 1 (Vulnerability Analysis) from the CEH v13 (312-50v13) exam blueprint (v5).

These questions are inspired by the EC-Council CEH exam and are designed to help you test your knowledge of ethical hacking tools, techniques, and methodologies. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CEH exam.

Note: CEH and Certified Ethical Hacker are registered trademarks of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CEH practice tests based on specific domains and subdomains, click that link.

CEH v13 Domain 3.1 Practice Test 001
10 questions • 8 single-answer, 2 multi-select
CEH v13 (312-50v13) • Domain 3: System Hacking Phases and Attack Techniques
Question 1
A penetration tester has been engaged to assess a large enterprise network prior to a scheduled audit. She runs a tool against the environment and receives output that categorizes discovered weaknesses into Critical, High, Medium, and Low severity ratings, cross-referenced with CVE identifiers and remediation recommendations. The client wants a formal deliverable they can present to their compliance team. What type of output has the penetration tester produced?
    Question 2
    Which of the following vulnerability assessment types is performed from the perspective of an unauthenticated external attacker with no prior knowledge of the target environment?
      Question 3
      During a network security audit, an analyst uses Nessus to scan a range of IP addresses. The tool returns a finding flagged as Plugin ID 10863 with a CVSS score of 9.8, indicating a remotely exploitable vulnerability with no authentication required. Based on this output, how should the analyst classify this finding according to standard vulnerability severity ratings?
        Question 4
        Kevin, a security analyst, is tasked with assessing a web application server. He decides to use Nikto to scan the target. After the scan completes, Kevin reviews the results and notices entries referencing outdated software versions, default files, and misconfigurations. Which type of vulnerability assessment is Kevin performing?
          Question 5
          Select all that apply
          A penetration tester is selecting tools to conduct a comprehensive vulnerability assessment of an enterprise environment. The engagement scope includes network infrastructure, operating systems, and web applications. The tester needs tools capable of authenticated scanning, CVE mapping, and generating exportable reports for the client. Which TWO of the following tools are MOST appropriate for this purpose? (Select two.)
            Question 6
            A security team at a financial institution wants to run vulnerability scans that can identify missing patches, insecure configurations, and software version information at the operating system level — information that would not be available to an external attacker. The team has valid domain credentials available. Which scanning approach should the team use to achieve this level of visibility?
              Question 7
              Clark, a professional hacker, has researched a target organization and discovered that they are running an unpatched version of Apache HTTP Server 2.4.49. He cross-references this against publicly available databases to confirm the exact vulnerability and its exploitability score before proceeding. Which of the following resources would BEST provide Clark with standardized vulnerability identifiers and scoring information for this specific finding?
                Question 8
                Which of the following BEST describes the difference between a vulnerability scan and a penetration test in the context of a security assessment?
                  Question 9
                  An ethical hacker is tasked with evaluating the security posture of an OT (operational technology) environment at a manufacturing plant. The engagement requires identifying vulnerabilities without disrupting live industrial control systems. The tester must minimize scan aggressiveness to avoid crashing PLCs and SCADA systems. Which vulnerability assessment approach is MOST appropriate for this scenario?
                    Question 10
                    Select all that apply
                    Jane is reviewing the output of a vulnerability assessment report for a medium-sized enterprise. She needs to prioritize remediation efforts for her team. The report contains dozens of findings across multiple severity levels. Which TWO factors should Jane use PRIMARILY to prioritize which vulnerabilities to remediate first? (Select two.)

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *