This practice test covers Domain 3 (System Hacking Phases and Attack Techniques) Subdomain 3 (Malware Threats) from the CEH v13 (312-50v13) exam blueprint (v5).

These questions are inspired by the EC-Council CEH exam and are designed to help you test your knowledge of ethical hacking tools, techniques, and methodologies. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CEH exam.

Note: CEH and Certified Ethical Hacker are registered trademarks of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CEH practice tests based on specific domains and subdomains, click that link.

CEH v13 Domain 3.3 Practice Test 002
10 questions • 8 single-answer, 2 multi-select
Question 1
Clark, a malicious actor targeting a financial services company, bundles a hidden reverse shell inside a legitimate-looking PDF viewer and tricks an employee into downloading and running it. The application functions as advertised while silently opening a command-and-control channel back to Clark's server. What type of malware has Clark deployed?
    Question 2
    A malware analyst investigating an endpoint alert finds no new executable files on disk, but observes shellcode injected into a legitimate Windows process (explorer.exe) and LOLBins being used to execute commands. The endpoint's signature-based antivirus found nothing, yet behavior-based detection flagged abnormal parent-child process relationships. Which malware technique best describes this attack?
      Question 3
      Select all that apply
      An incident response team reviewing a six-month intrusion at a defense contractor finds the attacker used stolen credentials, custom implants communicating over HTTPS on port 443, and specifically targeted high-value users before exfiltrating sensitive design documents. The IR team concludes the activity matches a state-sponsored threat group operating with strategic, long-term objectives. Which TWO characteristics are MOST consistent with an Advanced Persistent Threat (APT)? (Choose two)
        Question 4
        A single malicious email attachment at a large enterprise infects one employee's machine, and within hours thousands of hosts are compromised without any additional user interaction. The malware autonomously scans for vulnerable hosts and copies itself across the network by exploiting an unpatched SMB vulnerability. Which malware classification best describes this threat?
          Question 5
          Jane, a malware analyst at a threat intelligence firm, executes a suspicious binary in an isolated sandbox environment and uses Process Monitor and Wireshark to record all file system writes, registry changes, and outbound network connections the sample makes in real time. She then catalogs the resulting indicators of compromise for the client report. Which type of malware analysis has Jane performed?
            Question 6
            A forensic report on a compromised developer workstation reveals the attacker's tool captured keystrokes, took periodic screenshots, activated the webcam on demand, and received remote commands — all without any visible interface to the victim. The tool installed itself as a Windows service and communicated over an encrypted channel to a domain registered one week before the attack. What category of malware best describes this tool?
              Question 7
              Select all that apply
              A CISO reviewing a malware outbreak finds that a custom-compiled implant with no known signatures communicated over HTTPS and achieved persistence via a WMI subscription, fully bypassing the organization's existing signature-based antivirus. She wants to implement two controls that would detect or prevent this class of attack in future incidents. Which TWO countermeasures would MOST effectively address this threat? (Choose two)
                Question 8
                Elijah distributes a fake free video conferencing tool that, once installed, encrypts all local and mapped drive files and demands $2,000 in cryptocurrency within 72 hours, threatening to delete the decryption key if payment is not received. The malware does not spread to other hosts, does not open a persistent remote access channel, and communicates with Elijah's server only to deliver the decryption key upon payment. What type of malware has Elijah deployed?
                  Question 9
                  A malware sample collected from an enterprise network exhibits a different byte-level signature on each infected machine, making it impossible to create a single static detection rule across all hosts. Analysis reveals the sample uses an internal mutation engine to rewrite its own binary code during each replication cycle while preserving its core functional payload. Which malware category does this sample belong to?
                    Question 10
                    An OT security consultant investigating a disruption at a water treatment facility finds the attacker used a compromised vendor VPN account to deploy a custom implant that lay dormant for three months before modifying PLC setpoints to alter chemical dosing levels. The implant was specifically engineered for the facility's SCADA platform, indicating prior intelligence gathering about the target environment. How should this attack be classified?

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *