ceh-v13 prep questions. Jorge - www.youtube.
com/@itbestpractice2741
CEH v13 Practice Questions – Module 6:
System Hacking
1. Which of the following is a primary objective of system hacking?
• A. Conducting passive reconnaissance
• B. Exploiting vulnerabilities to gain unauthorized access
• C. Sending phishing emails
• D. Performing DNS enumeration
Answer: B
2. Which of the following tools can be used to dump password hashes from a Windows
system?
• A. Nmap
• B. Metasploit
• C. John the Ripper
• D. Mimikatz
Answer: D
3. Which attack involves trying all possible password combinations until the correct one is
found?
• A. Dictionary attack
• B. Brute-force attack
• C. Social engineering
• D. Rainbow table attack
Answer: B
4. What is the purpose of privilege escalation in system hacking?
• A. Lower the user’s access rights
• B. Run system updates
• C. Gain higher-level access such as administrator or root
• D. Hide the attack from IDS
Answer: C
ceh-v13 prep questions. Jorge - www.youtube.com/@itbestpractice2741
5. Which of the following best defines steganography?
• A. Scrambling data with symmetric encryption
• B. Hiding data inside other files such as images
• C. Encoding commands in TCP packets
• D. Writing viruses that self-replicate
Answer: B
6. Which command lists all users on a Windows system from the command prompt?
• A. whoami
• B. net user
• C. hostname
• D. ipconfig
Answer: B
7. What is the role of the SAM file in Windows systems?
• A. Stores system logs
• B. Contains system registry values
• C. Stores user password hashes
• D. Logs DNS queries
Answer: C
8. Which of the following is a method used for hiding running processes on a system?
• A. Rootkits
• B. Firewalls
• C. Hash tables
• D. Session hijacking
Answer: A
9. Which attack replaces the user’s login shell to maintain access?
• A. Trojan
• B. Rootkit injection
• C. Shell replacement attack
• D. Backdoor shell
ceh-v13 prep questions. Jorge - www.youtube.com/@itbestpractice2741
Answer: C
10. Which of the following attacks captures keystrokes to steal credentials?
• A. Buffer overflow
• B. Session hijacking
• C. Keylogging
• D. Privilege escalation
Answer: C
11. Which of the following tools can crack Windows password hashes offline?
• A. Wireshark
• B. Hydra
• C. John the Ripper
• D. Maltego
Answer: C
12. Which Linux file contains user account information and hashed passwords?
• A. /etc/shadow
• B. /etc/passwd
• C. /etc/users
• D. /home/.user
Answer: A
13. Which method can be used to hide a file in Windows?
• A. Use of /dev/null
• B. Hiding in Alternate Data Streams (ADS)
• C. Running a cron job
• D. Renaming the file with .bak extension
Answer: B
14. What is the primary purpose of clearing event logs in system hacking?
• A. To free up disk space
• B. To prevent detection and forensic analysis
ceh-v13 prep questions. Jorge - www.youtube.com/@itbestpractice2741
• C. To update system patches
• D. To reboot the target system
Answer: B
15. Which of the following is an example of a post-exploitation activity?
• A. Scanning open ports
• B. Delivering phishing emails
• C. Maintaining access through a backdoor
• D. Performing a DNS query
Answer: C
16. Which command in Linux is used to change file ownership?
• A. chmod
• B. chgrp
• C. chown
• D. usermod
Answer: C
17. What is the use of a bind shell in hacking?
• A. To bind malware to a host process
• B. To execute remote web applications
• C. To open a listening port for reverse connections
• D. To allow a remote attacker to connect to a shell
Answer: D
18. Which of the following can be used to maintain access on a compromised system?
• A. Trojan horse
• B. Firewall rules
• C. Secure boot
• D. Sandboxing
Answer: A
19. Which of the following commands in Linux displays the current user's effective ID?
ceh-v13 prep questions. Jorge - www.youtube.com/@itbestpractice2741
• A. id
• B. whoami
• C. groups
• D. passwd
Answer: A
20. Which tool in Metasploit allows privilege escalation through known exploits?
• A. msfvenom
• B. exploit/windows/local
• C. nmap
• D. snmpwalk
Answer: B
21. What is a common use of the 'at' command in Windows post-exploitation?
• A. Run file explorer
• B. Start antivirus scan
• C. Schedule a malicious task
• D. Reboot the system
Answer: C
22. What type of attack involves modifying a system to allow repeated access?
• A. Reconnaissance attack
• B. Spoofing attack
• C. Persistent backdoor installation
• D. Sniffing attack
Answer: C
23. Which of the following best helps an attacker escalate privileges on a local system?
• A. Open FTP ports
• B. Misconfigured SUID binaries
• C. HTTPS traffic logs
• D. VPN tunnels
Answer: B
ceh-v13 prep questions. Jorge - www.youtube.com/@itbestpractice2741
24. What is the purpose of a reverse shell?
• A. It tunnels traffic through SSH
• B. It creates encrypted backups
• C. It allows a target system to initiate connection to the attacker
• D. It encrypts outgoing packets
Answer: C