CEH - Certified Ethical Hacker Practice Questions: Sniffing Domain

Test your CEH - Certified Ethical Hacker knowledge with 5 practice questions from the Sniffing domain. Includes detailed explanations and answers.

CEH - Certified Ethical Hacker Practice Questions

Master the Sniffing Domain

Test your knowledge in the Sniffing domain with these 5 practice questions. Each question is designed to help you prepare for the CEH - Certified Ethical Hacker certification exam with detailed explanations to reinforce your learning.

Question 1

You are tasked with capturing HTTPS traffic for analysis. Which tool can help you decrypt SSL/TLS encrypted traffic on the fly during a testing engagement?

A) Wireshark

B) SSLstrip

C) Nmap

D) Nikto

Show Answer & Explanation

Correct Answer: B

Explanation: SSLstrip can downgrade HTTPS connections to HTTP, enabling the capture of unencrypted traffic. The tool is effective for testing SSL/TLS security configurations.

Question 2

Which protocol can be used to securely tunnel traffic and prevent sniffing?

A) HTTP

B) FTP

C) SSH

D) Telnet

Show Answer & Explanation

Correct Answer: C

Explanation: CORRECT: SSH provides a secure tunnel for traffic, preventing sniffing. OPTION A: HTTP transmits data in clear text, making it vulnerable to sniffing. OPTION B: FTP is unencrypted and vulnerable to sniffing. OPTION C: SSH is correct as it encrypts traffic, preventing sniffing. OPTION D: Telnet transmits data in clear text, making it vulnerable to sniffing.

Question 3

During a security assessment, you need to intercept and modify HTTP traffic on the fly. Which of the following frameworks would you use?

A) Metasploit

B) Burp Suite

C) Wireshark

D) Snort

Show Answer & Explanation

Correct Answer: B

Explanation: Burp Suite is an integrated platform for performing security testing of web applications. Its proxy allows you to intercept, modify, and analyze HTTP requests and responses.

Question 4

Which of the following protocols is most vulnerable to sniffing attacks due to lack of encryption?

A) HTTPS

B) SSH

C) FTP

D) SFTP

Show Answer & Explanation

Correct Answer: C

Explanation: FTP transmits data in plain text, making it susceptible to sniffing attacks as sensitive information like usernames and passwords can be easily captured and read.

Question 5

Which method would an attacker use to capture traffic from a network switch?

A) ARP poisoning

B) DNS spoofing

C) SQL injection

D) Cross-site scripting

Show Answer & Explanation

Correct Answer: A

Explanation: CORRECT: ARP poisoning allows an attacker to redirect network traffic, enabling sniffing on a switched network. OPTION A: ARP poisoning is correct as it enables traffic interception on switched networks. OPTION B: DNS spoofing redirects domain name queries, not traffic capture. OPTION C: SQL injection targets databases, not network traffic. OPTION D: Cross-site scripting exploits web applications, not network traffic.

Ready to Accelerate Your CEH - Certified Ethical Hacker Preparation?

Join thousands of professionals who are advancing their careers through expert certification preparation with FlashGenius.

  • ✅ Unlimited practice questions across all CEH - Certified Ethical Hacker domains
  • ✅ Full-length exam simulations with real-time scoring
  • ✅ AI-powered performance tracking and weak area identification
  • ✅ Personalized study plans with adaptive learning
  • ✅ Mobile-friendly platform for studying anywhere, anytime
  • ✅ Expert explanations and study resources
Start Free Practice Now

Already have an account? Sign in here

About CEH - Certified Ethical Hacker Certification

The CEH - Certified Ethical Hacker certification validates your expertise in sniffing and other critical domains. Our comprehensive practice questions are carefully crafted to mirror the actual exam experience and help you identify knowledge gaps before test day.

📘 Looking for the full study guide?
Check out our comprehensive guide: CEH Mock Exam Mastery: Practice Questions & Insights