Welcome to this CEH v13 practice test!

This practice test covers Domain 4 (Network and Perimeter Hacking) Subdomain 1 (Sniffing) from the CEH v13 (312-50v13) exam blueprint (v5).

These questions are inspired by the EC-Council CEH exam and are designed to help you test your knowledge of ethical hacking tools, techniques, and methodologies. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CEH exam.

Note: CEH and Certified Ethical Hacker are registered trademarks of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CEH practice tests based on specific domains and subdomains, click that link.

CEH v13 Domain 4.1 Practice Test 001
10 questions • 8 single-answer, 2 multi-select
CEH v13 (312-50v13) • Domain 4: Network and Perimeter Hacking — Sub-Domain 4.1: Sniffing
Question 1
A penetration tester connects to a switch-based network and wants to capture traffic destined for other hosts on the same subnet. The tester runs a tool that sends a flood of Ethernet frames with randomly generated, spoofed source MAC addresses to the switch. After a short period, the switch begins forwarding all frames out every port instead of only the intended destination port. What technique is the tester using, and what condition on the switch is being exploited?
    Question 2
    During a network security audit, an analyst reviews switch logs and notices that the CAM table is being repopulated extremely rapidly, entries are expiring and being replaced within seconds, and CPU utilization on the switch has spiked. No new legitimate devices have been added to the network. Which of the following countermeasures would MOST directly mitigate the attack that is likely occurring?
      Question 3
      Kevin, a professional hacker, has gained access to a network segment and wants to intercept traffic between a victim workstation (192.168.1.50) and the default gateway (192.168.1.1). Kevin sends unsolicited ARP reply packets to the victim stating that the gateway's IP address (192.168.1.1) maps to Kevin's MAC address. He simultaneously sends ARP replies to the gateway claiming that the victim's IP (192.168.1.50) maps to Kevin's MAC address. What attack is Kevin performing, and what is the intended outcome?
        Question 4
        A penetration tester uses Ettercap in a switched network environment to intercept credentials transmitted over the network. After the attack succeeds, the tester reviews the Ettercap logs and observes plaintext usernames and passwords from an internal web application. Which sniffing technique did Ettercap most likely use to redirect traffic through the tester's machine on this switched network?
          Question 5
          During an engagement, a pen tester observes the following Wireshark capture snippet: Frame 1: 192.168.1.100 → 255.255.255.255 DHCP Discover | Frame 2: 192.168.1.5 → 192.168.1.100 DHCP Offer (Gateway: 192.168.1.5, DNS: 192.168.1.5) | Frame 3: 192.168.1.200 → 192.168.1.100 DHCP Offer (Gateway: 192.168.1.1, DNS: 8.8.8.8) | Frame 4: 192.168.1.100 → 255.255.255.255 DHCP Request (selecting 192.168.1.5). The victim host accepted the offer from 192.168.1.5. The legitimate DHCP server is at 192.168.1.200. What attack is most likely occurring, and what is the attacker's goal?
            Question 6
            Select all that apply
            Clark, a professional hacker targeting a financial services firm, wants to perform DNS poisoning on the local network segment to redirect victim hosts to a fraudulent banking website. Clark has already achieved a man-in-the-middle position on the subnet using ARP poisoning. Which TWO techniques could Clark use to carry out DNS poisoning from his MitM position? (Choose two)
              Question 7
              An ethical hacker is tasked with testing network resilience against sniffing attacks on a flat Layer 2 corporate network. The tester wants to capture traffic using a passive approach — without sending any packets onto the network — by receiving a copy of all traffic passing through the switch. Which of the following methods would achieve this goal?
                Question 8
                Jane is conducting a black-box penetration test and has captured network traffic using Wireshark on a compromised internal host. She filters the capture for SNMP traffic and observes numerous SNMPv1 GetRequest and GetResponse packets between a network management station and several routers. Jane extracts a critical piece of information from these packets that grants her read access to the SNMP-managed devices. What did Jane most likely extract from the captured SNMP traffic, and why is SNMPv1 vulnerable to this?
                  Question 9
                  A security team detects unusual ARP traffic on their enterprise network. Upon investigation, they find that multiple hosts have identical MAC address entries for the default gateway in their ARP caches, and that MAC address belongs to a rogue machine. The team wants to implement a control that validates ARP packets against a trusted source before allowing them to update host ARP caches at the switch level. Which control should the security team implement?
                    Question 10
                    Select all that apply
                    During a penetration test, a tester wants to detect whether the network contains any hosts operating in promiscuous mode — a condition that may indicate an active sniffing attack. Which TWO methods can be used to identify hosts running network interfaces in promiscuous mode? (Choose two)

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *