CEH Quizzes, Questions & Answers

Did you know that it’s possible to become a hacker for a living? Read more

Top Trending CEH Quizzes


This CEH Quiz (101-200) assesses skills in cybersecurity, focusing on practical scenarios like footprinting, encryption, and attack detection. It's designed for professionals aiming to validate their ethical hacking expertise.

Questions: 100  |  Attempts: 738   |  Last updated: Mar 22, 2023
  • Sample Question
    You are footprinting an organization and gathering competitive intelligence. You visit the company's website for contact information and telephone numbers but do not find them listed there. You know they had the entire staff directory listed on their website 12 months ago but now it is not there. Is there any way you can retrieve information from a website that is outdated?
    Radio Button
    Radio Button
    Radio Button
    Radio Button

This CEH V9 quiz focuses on assessing advanced skills in ethical hacking, covering system security, threats, and attack vectors. It is designed for professionals seeking to validate their knowledge in cybersecurity, enhancing...

Questions: 25  |  Attempts: 11   |  Last updated: Aug 4, 2025
  • Sample Question
    Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing attacks?
    Radio Button
    Radio Button
    Radio Button
    Radio Button

This CEH Quiz (201-261) assesses knowledge on securing network communications, handling cryptographic protocols, and preventing common cyber attacks. It is designed for professionals aiming to validate their ethical hacking...

Questions: 61  |  Attempts: 489   |  Last updated: Mar 21, 2023
  • Sample Question
    Jane wishes to forward X-Windows traffic to a remote host as well as POP3 traffic. She is worried that adversaries might be monitoring the communication link and could inspect captured traffic. She would like to tunnel the information to the remote end but does not have VPN capabilities to do so. Which of the following tools can she use to protect the link?
    Radio Button
    Radio Button
    Radio Button
    Radio Button

A quiz to help those preparing for the ECDL Essentials unit 1 test.

Questions: 36  |  Attempts: 9976   |  Last updated: Mar 22, 2023
  • Sample Question
    Which one of the following can cause data corruption?
    Radio Button
    Radio Button
    Radio Button
    Radio Button

This quiz, titled '312-50 (Mixed Questions Set 2)', evaluates skills in cybersecurity through realistic penetration testing scenarios. It covers topics such as reconnaissance, ARP, metadata analysis, and collision attacks in...

Questions: 50  |  Attempts: 527   |  Last updated: Mar 21, 2023
  • Sample Question
    Your team has won a contract to infiltrate an organization. The company wants to have the attack be as realistic as possible; therefore, they did not provide any information besides the company name. What should be the first step in security testing the client?
    Radio Button
    Radio Button
    Radio Button
    Radio Button

Recent CEH Quizzes