Welcome to this CEH v13 practice test!

This practice test covers Domain 5 (Web Application Hacking) Subdomain 3 (SQL Injection) from the CEH v13 (312-50v13) exam blueprint (v5).

These questions are inspired by the EC-Council CEH exam and are designed to help you test your knowledge of ethical hacking tools, techniques, and methodologies. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CEH exam.

Note: CEH and Certified Ethical Hacker are registered trademarks of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CEH practice tests based on specific domains and subdomains, click that link.

CEH v13 Domain 5.3 Practice Test 001
10 questions • 8 single-answer, 2 multi-select
CEH v13 (312-50v13) • Domain 5: Web Application Hacking — Sub-Domain 5.3: SQL Injection
Question 1
While testing a login form, David inputs ' OR '1'='1 into the username field and successfully logs in without valid credentials. What type of SQL injection attack is this?
    Question 2
    During a database query test, Sarah appends a UNION SELECT statement to retrieve usernames and passwords from another table. What type of SQL injection is she performing?
      Question 3
      An application does not display database errors. However, when different inputs are sent, the response changes depending on whether a condition is true or false. What SQL injection technique is being used?
        Question 4
        While probing a web application, Michael injects payloads that introduce a delay in the server response when a condition is true. What type of SQL injection is this?
          Question 5
          An attacker injects a semicolon followed by another SQL command into an input field, successfully executing multiple queries in a single request. What type of SQL injection is this?
            Question 6
            Select all that apply
            A security tester is probing a web application for SQL injection vulnerabilities. Which TWO techniques are effective for identifying injection points? (Choose two)
              Question 7
              A web application sends SQL query results to an external DNS server controlled by an attacker to exfiltrate data. What type of SQL injection is this?
                Question 8
                An attacker observes detailed database error messages after submitting malformed SQL queries. What type of SQL injection does this indicate?
                  Question 9
                  A developer implements parameterized queries in a web application. Why does this effectively prevent SQL injection?
                    Question 10
                    Select all that apply
                    A security architect is reviewing defenses against SQL injection attacks. Which TWO controls are most effective in preventing SQL injection? (Choose two)

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *