CEH - Certified Ethical Hacker Practice Questions: Sniffing Domain
Test your CEH - Certified Ethical Hacker knowledge with 5 practice questions from the Sniffing domain. Includes detailed explanations and answers.
CEH - Certified Ethical Hacker Practice Questions
Master the Sniffing Domain
Test your knowledge in the Sniffing domain with these 5 practice questions. Each question is designed to help you prepare for the CEH - Certified Ethical Hacker certification exam with detailed explanations to reinforce your learning.
Question 1
You are tasked with capturing HTTPS traffic for analysis. Which tool can help you decrypt SSL/TLS encrypted traffic on the fly during a testing engagement?
Show Answer & Explanation
Correct Answer: B
Explanation: SSLstrip can downgrade HTTPS connections to HTTP, enabling the capture of unencrypted traffic. The tool is effective for testing SSL/TLS security configurations.
Question 2
Which protocol can be used to securely tunnel traffic and prevent sniffing?
Show Answer & Explanation
Correct Answer: C
Explanation: CORRECT: SSH provides a secure tunnel for traffic, preventing sniffing. OPTION A: HTTP transmits data in clear text, making it vulnerable to sniffing. OPTION B: FTP is unencrypted and vulnerable to sniffing. OPTION C: SSH is correct as it encrypts traffic, preventing sniffing. OPTION D: Telnet transmits data in clear text, making it vulnerable to sniffing.
Question 3
During a security assessment, you need to intercept and modify HTTP traffic on the fly. Which of the following frameworks would you use?
Show Answer & Explanation
Correct Answer: B
Explanation: Burp Suite is an integrated platform for performing security testing of web applications. Its proxy allows you to intercept, modify, and analyze HTTP requests and responses.
Question 4
Which of the following protocols is most vulnerable to sniffing attacks due to lack of encryption?
Show Answer & Explanation
Correct Answer: C
Explanation: FTP transmits data in plain text, making it susceptible to sniffing attacks as sensitive information like usernames and passwords can be easily captured and read.
Question 5
Which method would an attacker use to capture traffic from a network switch?
Show Answer & Explanation
Correct Answer: A
Explanation: CORRECT: ARP poisoning allows an attacker to redirect network traffic, enabling sniffing on a switched network. OPTION A: ARP poisoning is correct as it enables traffic interception on switched networks. OPTION B: DNS spoofing redirects domain name queries, not traffic capture. OPTION C: SQL injection targets databases, not network traffic. OPTION D: Cross-site scripting exploits web applications, not network traffic.
Ready to Accelerate Your CEH - Certified Ethical Hacker Preparation?
Join thousands of professionals who are advancing their careers through expert certification preparation with FlashGenius.
- ✅ Unlimited practice questions across all CEH - Certified Ethical Hacker domains
- ✅ Full-length exam simulations with real-time scoring
- ✅ AI-powered performance tracking and weak area identification
- ✅ Personalized study plans with adaptive learning
- ✅ Mobile-friendly platform for studying anywhere, anytime
- ✅ Expert explanations and study resources
Already have an account? Sign in here
About CEH - Certified Ethical Hacker Certification
The CEH - Certified Ethical Hacker certification validates your expertise in sniffing and other critical domains. Our comprehensive practice questions are carefully crafted to mirror the actual exam experience and help you identify knowledge gaps before test day.
Check out our comprehensive guide: CEH Mock Exam Mastery: Practice Questions & Insights