CEH - Certified Ethical Hacker Practice Questions: Enumeration Domain
Test your CEH - Certified Ethical Hacker knowledge with 5 practice questions from the Enumeration domain. Includes detailed explanations and answers.
CEH - Certified Ethical Hacker Practice Questions
Master the Enumeration Domain
Test your knowledge in the Enumeration domain with these 5 practice questions. Each question is designed to help you prepare for the CEH - Certified Ethical Hacker certification exam with detailed explanations to reinforce your learning.
Question 1
While performing enumeration tasks, you receive the results from an SMB scan. Which of the following could SMB enumeration reveal about the target system?
Show Answer & Explanation
Correct Answer: B
Explanation: SMB enumeration can reveal user accounts, shared resources, and potentially sensitive information stored or shared on the network. It does not directly provide open ports, SSL certificate details, or firewall rules.
Question 2
As part of an enumeration phase, you're tasked with identifying shared folders on a target Windows network. Which command provides this information using SMB?
Show Answer & Explanation
Correct Answer: A
Explanation: The 'smbclient -L //targetIP' command lists shared folders on a specified target using the SMB protocol, which is commonly used in Windows networks.
Question 3
You are conducting a penetration test and need to identify email addresses associated with a domain. Which technique would be most useful for this enumeration task?
Show Answer & Explanation
Correct Answer: C
Explanation: Harvesting from public sources such as social media, company websites, and public forums is effective for collecting email addresses. DNS zone transfers and WHOIS lookups provide other types of domain information, and port scanning is unrelated to email enumeration.
Question 4
You're attempting to enumerate a target system's DNS records to gather more information about the domain. Which tool would be most appropriate for this task?
Show Answer & Explanation
Correct Answer: A
Explanation: Nslookup is a network administration command-line tool for querying the Domain Name System (DNS) to obtain domain name or IP address mapping or for any other specific DNS record.
Question 5
In a corporate environment, you need to enumerate the wireless networks within range. Which tool would be most appropriate for this task and why?
Show Answer & Explanation
Correct Answer: C
Explanation: Kismet is designed specifically for wireless network detection and enumeration, capturing SSIDs and other network details. Aircrack-ng is used for cracking WEP/WPA keys, Wireshark analyzes traffic but is not specialized for wireless detection, and Nmap is for general network scanning.
Ready to Accelerate Your CEH - Certified Ethical Hacker Preparation?
Join thousands of professionals who are advancing their careers through expert certification preparation with FlashGenius.
- ✅ Unlimited practice questions across all CEH - Certified Ethical Hacker domains
- ✅ Full-length exam simulations with real-time scoring
- ✅ AI-powered performance tracking and weak area identification
- ✅ Personalized study plans with adaptive learning
- ✅ Mobile-friendly platform for studying anywhere, anytime
- ✅ Expert explanations and study resources
Already have an account? Sign in here
About CEH - Certified Ethical Hacker Certification
The CEH - Certified Ethical Hacker certification validates your expertise in enumeration and other critical domains. Our comprehensive practice questions are carefully crafted to mirror the actual exam experience and help you identify knowledge gaps before test day.
Check out our comprehensive guide: CEH Mock Exam Mastery: Practice Questions & Insights