CEH - Certified Ethical Hacker Practice Questions: Scanning Networks Domain

Test your CEH - Certified Ethical Hacker knowledge with 5 practice questions from the Scanning Networks domain. Includes detailed explanations and answers.

CEH - Certified Ethical Hacker Practice Questions

Master the Scanning Networks Domain

Test your knowledge in the Scanning Networks domain with these 5 practice questions. Each question is designed to help you prepare for the CEH - Certified Ethical Hacker certification exam with detailed explanations to reinforce your learning.

Question 1

Which scanning technique involves sending SYN packets to a target and analyzing the responses to determine open ports?

A) Xmas Scan

B) ACK Scan

C) SYN Scan

D) FIN Scan

Show Answer & Explanation

Correct Answer: C

Explanation: CORRECT: SYN Scan involves sending SYN packets and is a popular technique for identifying open ports. OPTION A: Xmas Scan sends packets with FIN, PSH, and URG flags, not SYN. OPTION B: ACK Scan is used to map firewall rules, not identify open ports specifically. OPTION C: SYN Scan is correct as it uses SYN packets to identify open ports. OPTION D: FIN Scan sends FIN packets and is less reliable than SYN Scan for port identification.

Question 2

During a network scan, an ethical hacker discovers a service running on port 22. Which of the following tools would best help the hacker identify the software version and potential vulnerabilities of this service?

A) Wireshark

B) Nmap

C) Burp Suite

D) Metasploit

Show Answer & Explanation

Correct Answer: B

Explanation: CORRECT: Nmap can be used to perform service version detection to identify software versions and potential vulnerabilities. OPTION A: Wireshark is a packet analyzer, not suited for service version detection. OPTION B: Nmap is correct as it can perform service version detection. OPTION C: Burp Suite is used for web application testing, not for network service version detection. OPTION D: Metasploit is used for exploitation, not primarily for identifying service versions.

Question 3

You have been tasked with performing a network scan to identify live hosts in a client's internal network. Which tool would you use to perform a simple ping sweep to achieve this task?

A) Nmap

B) Wireshark

C) John the Ripper

D) Metasploit

Show Answer & Explanation

Correct Answer: A

Explanation: Nmap is a versatile scanning tool that can be used to perform a variety of scans, including ping sweeps to discover live hosts on a network. Wireshark is primarily a packet analyzer, John the Ripper is for password cracking, and Metasploit is a penetration testing framework.

Question 4

An ethical hacker is using a tool to perform a vulnerability scan on a network. Which of the following is a common output of such a scan?

A) List of open ports

B) List of user passwords

C) List of detected vulnerabilities

D) List of encrypted files

Show Answer & Explanation

Correct Answer: C

Explanation: CORRECT: A vulnerability scan produces a list of detected vulnerabilities within the network. OPTION A: A list of open ports is the result of a port scan, not a vulnerability scan. OPTION B: User passwords are not typically output from a vulnerability scan. OPTION C: A list of detected vulnerabilities is correct. OPTION D: A list of encrypted files is not related to vulnerability scanning.

Question 5

While performing a network scan, you notice several hosts responding to both UDP and TCP requests on unusual ports. What could this indicate?

A) Normal network behavior

B) A well-configured firewall

C) Potential Trojan activity

D) Misconfigured DNS servers

Show Answer & Explanation

Correct Answer: C

Explanation: Hosts responding to requests on unusual ports could indicate potential Trojan activity, as Trojans often use non-standard ports to communicate. This behavior is not typical of normal network configurations or a well-configured firewall, and misconfigured DNS servers would not typically cause such responses.

Ready to Accelerate Your CEH - Certified Ethical Hacker Preparation?

Join thousands of professionals who are advancing their careers through expert certification preparation with FlashGenius.

  • ✅ Unlimited practice questions across all CEH - Certified Ethical Hacker domains
  • ✅ Full-length exam simulations with real-time scoring
  • ✅ AI-powered performance tracking and weak area identification
  • ✅ Personalized study plans with adaptive learning
  • ✅ Mobile-friendly platform for studying anywhere, anytime
  • ✅ Expert explanations and study resources
Start Free Practice Now

Already have an account? Sign in here

About CEH - Certified Ethical Hacker Certification

The CEH - Certified Ethical Hacker certification validates your expertise in scanning networks and other critical domains. Our comprehensive practice questions are carefully crafted to mirror the actual exam experience and help you identify knowledge gaps before test day.

📘 Looking for the full study guide?
Check out our comprehensive guide: CEH Mock Exam Mastery: Practice Questions & Insights