Welcome to this CEH v13 practice test!

This practice test covers Domain 4 (Network and Perimeter Hacking) Subdomain 2 (Social Engineering) from the CEH v13 (312-50v13) exam blueprint (v5).

These questions are inspired by the EC-Council CEH exam and are designed to help you test your knowledge of ethical hacking tools, techniques, and methodologies. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CEH exam.

Note: CEH and Certified Ethical Hacker are registered trademarks of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CEH practice tests based on specific domains and subdomains, click that link.

CEH v13 Domain 4.2 Practice Test 001
10 questions • 8 single-answer, 2 multi-select
CEH v13 (312-50v13) • Domain 4: Network and Perimeter Hacking — Sub-Domain 4.2: Social Engineering
Question 1
An ethical hacker is conducting a social engineering assessment against a corporate environment. The tester calls an employee pretending to be from the IT helpdesk and convinces the employee to reset their password and share the temporary credentials. What type of social engineering attack is being performed?
    Question 2
    During an engagement, a penetration tester sends an email to employees containing a link to a fake login page that mimics the organization's webmail portal. Several employees enter their credentials into the fake page. What type of attack is this?
      Question 3
      A tester drops several USB drives labeled 'Confidential Payroll Data' in the parking lot of a company. Employees pick them up and plug them into their work computers, unknowingly executing malicious code. What social engineering technique is this?
        Question 4
        An attacker sends SMS messages to employees with a malicious link claiming to be from the HR department. The message urges recipients to update their payroll information immediately. What type of attack is being used?
          Question 5
          During a physical security test, an attacker follows an authorized employee into a restricted building without presenting credentials. The employee holds the door open out of courtesy. What attack technique is demonstrated?
            Question 6
            Select all that apply
            A security team is designing awareness training to defend against social engineering attacks. Which TWO practices would MOST effectively reduce the risk of successful phishing attacks? (Choose two)
              Question 7
              An attacker calls a company and offers free technical support in exchange for login credentials to 'fix' a problem. The victim willingly provides their credentials in exchange for assistance. What type of social engineering attack is this?
                Question 8
                A security analyst notices that an attacker has redirected users from a legitimate banking website to a malicious one without their knowledge by altering DNS entries. Which social engineering-related attack is this?
                  Question 9
                  During a red team engagement, an attacker observes an employee entering their password on a workstation by looking over their shoulder in a crowded office environment. What technique is being used?
                    Question 10
                    Select all that apply
                    A penetration tester is planning a social engineering campaign targeting executives (whaling). Which TWO characteristics distinguish whaling attacks from general phishing attacks? (Choose two)

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *