CEH v13 Domain 9.1 Practice Test 002

This practice test covers Domain 9 (Cryptography) Subdomain 1 (Cryptography) from the CEH v13 (312-50v13) exam blueprint (v5).

These questions are inspired by the EC-Council CEH exam and are designed to help you test your knowledge of ethical hacking tools, techniques, and methodologies. Some questions require multiple correct answers.

These are not official exam questions or brain dumps. They are original scenario-based questions created to reflect the skills and knowledge tested in the CEH exam.

Note: CEH and Certified Ethical Hacker are registered trademarks of EC-Council. This content is not affiliated with or endorsed by EC-Council.

To choose CEH practice tests based on specific domains and subdomains, click that link.

CEH v13 Domain 9.1 Practice Test 002
10 questions • 8 single-answer, 2 multi-select
Question 1
Kevin is tasked with selecting an appropriate symmetric encryption algorithm for a new enterprise data-at-rest encryption solution that must support 128-bit block size, variable key lengths of 128, 192, or 256 bits, and is the current NIST standard replacing DES. The security team requires a FIPS 197-compliant algorithm that uses a substitution-permutation network structure. Which encryption algorithm meets all of these requirements?
    Question 2
    Jane is a PKI administrator at a multinational corporation and receives a notification that one of the organization's digital certificates has been compromised before its scheduled expiration date and must be immediately invalidated. She needs to publish the certificate's serial number in a digitally signed list that clients can download and check against before establishing TLS connections. Which PKI mechanism does Jane use to invalidate the compromised certificate?
      Question 3
      A penetration tester discovers that a web application stores unsalted MD5 password hashes and uses a space-time tradeoff technique that employs precomputed chains of hash values and reduction functions to efficiently recover plaintext passwords from the stolen database. She runs the attack and recovers 80% of user passwords within minutes without requiring a full precomputed lookup table stored entirely in memory. Which cryptanalysis technique is she using?
        Question 4
        An enterprise security architect is designing a code-signing solution for software distribution and must select a hashing algorithm that produces a 256-bit message digest, is resistant to known collision and preimage attacks, and replaces the deprecated SHA-1 per current NIST recommendations. The selected algorithm will be combined with RSA-2048 to create digital signatures that verify software authenticity and integrity for enterprise endpoints. Which hashing algorithm should the architect select?
          Question 5
          Elijah is analyzing a captured TLS handshake and observes that the client encrypts a pre-master secret using the server's public key, which the server decrypts with its corresponding private key to derive a shared symmetric session key for the connection. He notes that compromise of the server's long-term private key at any future point would allow decryption of all previously recorded encrypted sessions because session keys are derived deterministically from the same long-term key material. Which TLS key exchange mechanism does this session use?
            Question 6
            Select all that apply
            A red team is performing a cryptographic assessment of an organization's legacy PKI infrastructure and identifies two attack types that directly exploit mathematical weaknesses in cryptographic hash functions to undermine digital signature integrity. The team needs to distinguish attacks targeting hash function mathematics from those exploiting implementation flaws or network-layer weaknesses. Which two attacks directly exploit hash function vulnerabilities? (Choose two)
              Question 7
              A security analyst at a law firm needs to implement encrypted email communication that uses a decentralized web of trust model for key validation rather than a hierarchical certificate authority, allowing participants to sign each other's public keys to directly vouch for their authenticity. She selects an open-source protocol that provides both message confidentiality through asymmetric encryption and sender authentication through digital signatures without requiring a central trust authority. Which email encryption protocol is the analyst implementing?
                Question 8
                Clark is a security engineer deploying a full-disk encryption solution for 5,000 Windows 10 enterprise laptops that must encrypt the entire drive including the operating system partition, support pre-boot authentication, integrate with Active Directory for centralized recovery key storage, and leverage the onboard TPM chip for automatic unlock on trusted hardware. The organization requires a solution native to Windows with no additional third-party software licensing or endpoint agent deployment. Which disk encryption solution meets all of Clark's requirements?
                  Question 9
                  Select all that apply
                  A penetration tester conducting a PKI security assessment for a financial institution is mapping the certificate infrastructure to identify high-value targets in the certificate issuance pipeline that would allow an attacker to forge digital certificates for any entity if compromised. She needs to identify the two core PKI components that together handle identity verification and formal certificate issuance. Which two components are core to a PKI certificate issuance infrastructure? (Choose two)
                    Question 10
                    A wireless security analyst conducting an authorized assessment of a corporate WPA2-PSK network captures the 4-way handshake by sending deauthentication frames to force a client reconnection, then runs dictionary and rule-based mutation attacks against the captured handshake file to recover the pre-shared key. She successfully cracks the PSK by applying a wordlist combined with custom rules that append numeric suffixes and substitute characters. Which tool is she most likely using to perform the WPA2 PSK cracking?

                      Leave a Comment

                      Your email address will not be published. Required fields are marked *

                      Scroll to Top