Welcome to this CEH v13 practice test!

This practice test covers Domain 7 (Mobile Platform, IoT, and OT Hacking) Subdomain 1 (Hacking Mobile Platforms) from the CEH v13 (312-50v13) exam blueprint (v5).

These questions are inspired by the EC-Council CEH exam and are designed to help you test your knowledge of ethical hacking tools, techniques, and methodologies. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CEH exam.

Note: CEH and Certified Ethical Hacker are registered trademarks of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CEH practice tests based on specific domains and subdomains, click that link.

CEH v13 Domain 7.1 Practice Test 001
10 questions • 8 single-answer, 2 multi-select
CEH v13 (312-50v13) • Domain 7: Mobile Platform, IoT, and OT Hacking — Sub-Domain 7.1: Hacking Mobile Platforms
Question 1
A penetration tester installs a malicious application on an Android device that secretly records user activity and sends data to a remote server. What type of threat is this?
    Question 2
    An attacker distributes a fake mobile banking app that looks identical to a legitimate one and collects user credentials. What type of attack is being performed?
      Question 3
      A tester exploits a vulnerability in an Android application that allows execution of arbitrary code due to improper input validation. What type of vulnerability is this?
        Question 4
        An attacker gains root access to a mobile device by exploiting a kernel vulnerability. What is this process commonly known as?
          Question 5
          A mobile application stores sensitive user credentials in plaintext within local storage. What vulnerability does this represent?
            Question 6
            Select all that apply
            A penetration tester is analyzing mobile application security. Which TWO weaknesses commonly expose mobile applications to attacks? (Choose two)
              Question 7
              An attacker intercepts communication between a mobile app and a backend server using a proxy tool. What type of attack is this?
                Question 8
                A tester finds that a mobile app does not validate SSL certificates, allowing interception of encrypted traffic. What vulnerability is this?
                  Question 9
                  An attacker reverse engineers a mobile application to understand its logic and extract sensitive information. What technique is being used?
                    Question 10
                    Select all that apply
                    An ethical hacker is assessing mobile device security. Which TWO practices help secure mobile platforms against attacks? (Choose two)

                      Leave a Reply

                      Your email address will not be published. Required fields are marked *