Welcome to this CEH v13 practice test!

This practice test covers Domain 4 (Network and Perimeter Hacking) Subdomain 5 (Evading IDS, Firewalls, and Honeypots) from the CEH v13 (312-50v13) exam blueprint (v5).

These questions are inspired by the EC-Council CEH exam and are designed to help you test your knowledge of ethical hacking tools, techniques, and methodologies. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CEH exam.

Note: CEH and Certified Ethical Hacker are registered trademarks of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CEH practice tests based on specific domains and subdomains, click that link.

CEH v13 Domain 4.5 Practice Test 001
10 questions • 8 single-answer, 2 multi-select
CEH v13 (312-50v13) • Domain 4: Network and Perimeter Hacking — Sub-Domain 4.5: Evading IDS, Firewalls, and Honeypots
Question 1
A penetration tester uses Nmap with the -f option to fragment packets into smaller pieces during a scan. The goal is to bypass firewall detection mechanisms. What technique is being used?
    Question 2
    An attacker sends packets with a Time-To-Live (TTL) value that expires before reaching the IDS but reaches the target system. This prevents the IDS from analyzing the full packet content. What technique is this?
      Question 3
      During an assessment, a tester sends packets with the ACK flag set to bypass firewall rules that only filter SYN packets. What technique is being used?
        Question 4
        An attacker modifies packet headers to disguise malicious traffic as legitimate traffic, making it harder for IDS systems to detect anomalies. What technique is this?
          Question 5
          A tester uses HTTP tunneling to encapsulate malicious traffic within normal HTTP requests to bypass firewall restrictions. What is this technique called?
            Question 6
            Select all that apply
            A penetration tester wants to evade IDS detection during a scan. Which TWO techniques are commonly used for IDS evasion? (Choose two)
              Question 7
              An attacker detects a system that appears vulnerable but behaves unusually by logging all interactions and not responding like a normal system. What is the attacker most likely interacting with?
                Question 8
                A tester sends packets with unusual flag combinations such as FIN, URG, and PSH to avoid detection by signature-based IDS systems. What type of scan is this?
                  Question 9
                  An attacker encodes malicious payloads to avoid detection by signature-based IDS systems. Which technique is being used?
                    Question 10
                    Select all that apply
                    An ethical hacker is attempting to detect and avoid honeypots during an engagement. Which TWO indicators may suggest the presence of a honeypot? (Choose two)

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *