Quiz — Ceh
View certificationSecurity
8 topics available
Mixed quiz
Mixed questions from all topics of this certification.
Mock exam
Real exam simulation with time limit and final score.
- Gaining Unauthorized AccessTechniques to gain access to target systems: password cracking, brute-force attacks, privilege escalation.Open topic →
- Maintaining AccessMethods to persist access to compromised systems: backdoors, rootkits, trojans, tunnels, and evasion techniques.Open topic →
- Covering Tracks and ForensicsTechniques for erasing or tampering with attack traces and basic principles of digital forensics and incident response.Open topic →
- Ethical Hacking FundamentalsPrinciples, terminology, and legal aspects of ethical hacking.Open topic →
- Types of Attacks and ThreatsOverview of malware, phishing, DoS, SQL injection, and other common threats.Open topic →
- Information Gathering TechniquesReconnaissance and footprinting methods to collect data about a target.Open topic →
- Vulnerability Scanning and ExploitationTools and techniques to identify and exploit system vulnerabilities.Open topic →
- Web Application AttacksCommon web app attacks such as XSS, CSRF, SQL injection, directory traversal, and practical countermeasures.Open topic →