FlashGenius Logo FlashGenius
Login Sign Up

CEH - Certified Ethical Hacker Practice Questions: Enumeration Domain

Test your CEH - Certified Ethical Hacker knowledge with 5 practice questions from the Enumeration domain. Includes detailed explanations and answers.

CEH - Certified Ethical Hacker Practice Questions

Master the Enumeration Domain

Test your knowledge in the Enumeration domain with these 5 practice questions. Each question is designed to help you prepare for the CEH - Certified Ethical Hacker certification exam with detailed explanations to reinforce your learning.

Question 1

While performing enumeration tasks, you receive the results from an SMB scan. Which of the following could SMB enumeration reveal about the target system?

A) Open TCP and UDP ports

B) User accounts and shared resources

C) SSL certificate details

D) Firewall rules and configurations

Show Answer & Explanation

Correct Answer: B

Explanation: SMB enumeration can reveal user accounts, shared resources, and potentially sensitive information stored or shared on the network. It does not directly provide open ports, SSL certificate details, or firewall rules.

Question 2

As part of an enumeration phase, you're tasked with identifying shared folders on a target Windows network. Which command provides this information using SMB?

A) smbclient -L //targetIP

B) nmap -sP targetIP

C) netstat -rn

D) tracert targetIP

Show Answer & Explanation

Correct Answer: A

Explanation: The 'smbclient -L //targetIP' command lists shared folders on a specified target using the SMB protocol, which is commonly used in Windows networks.

Question 3

You are conducting a penetration test and need to identify email addresses associated with a domain. Which technique would be most useful for this enumeration task?

A) DNS zone transfer

B) WHOIS lookup

C) Harvesting from public sources

D) Port scanning

Show Answer & Explanation

Correct Answer: C

Explanation: Harvesting from public sources such as social media, company websites, and public forums is effective for collecting email addresses. DNS zone transfers and WHOIS lookups provide other types of domain information, and port scanning is unrelated to email enumeration.

Question 4

You're attempting to enumerate a target system's DNS records to gather more information about the domain. Which tool would be most appropriate for this task?

A) nslookup

B) Wireshark

C) Hydra

D) Metasploit

Show Answer & Explanation

Correct Answer: A

Explanation: Nslookup is a network administration command-line tool for querying the Domain Name System (DNS) to obtain domain name or IP address mapping or for any other specific DNS record.

Question 5

In a corporate environment, you need to enumerate the wireless networks within range. Which tool would be most appropriate for this task and why?

A) Aircrack-ng

B) Wireshark

C) Kismet

D) nmap

Show Answer & Explanation

Correct Answer: C

Explanation: Kismet is designed specifically for wireless network detection and enumeration, capturing SSIDs and other network details. Aircrack-ng is used for cracking WEP/WPA keys, Wireshark analyzes traffic but is not specialized for wireless detection, and Nmap is for general network scanning.

Ready to Accelerate Your CEH - Certified Ethical Hacker Preparation?

Join thousands of professionals who are advancing their careers through expert certification preparation with FlashGenius.

  • ✅ Unlimited practice questions across all CEH - Certified Ethical Hacker domains
  • ✅ Full-length exam simulations with real-time scoring
  • ✅ AI-powered performance tracking and weak area identification
  • ✅ Personalized study plans with adaptive learning
  • ✅ Mobile-friendly platform for studying anywhere, anytime
  • ✅ Expert explanations and study resources
Start Free Practice Now

Already have an account? Sign in here

About CEH - Certified Ethical Hacker Certification

The CEH - Certified Ethical Hacker certification validates your expertise in enumeration and other critical domains. Our comprehensive practice questions are carefully crafted to mirror the actual exam experience and help you identify knowledge gaps before test day.

📘 Looking for the full study guide?
Check out our comprehensive guide: CEH Mock Exam Mastery: Practice Questions & Insights

📚 Explore More CEH Practice Questions by Topic

🔐 Certified Ethical Hacker (CEH) Cheat Sheet

Boost your CEH exam prep with our concise, expert-made CEH Cheat Sheet. Covers tools, attack types, protocols, and key concepts — all in one handy reference.

View CEH Cheat Sheet →

Certified Ethical Hacker (CEH) – Enumeration Domain: Frequently Asked Questions

Master the CEH Enumeration domain with concise answers to common questions, real-world examples, and direct links to Enumeration-focused practice on FlashGenius.

What is Enumeration in CEH?

Enumeration is the active extraction of detailed information from discovered services and systems—such as usernames, groups, shares, DNS records, SNMP data, and configuration details. It typically follows scanning and helps ethical hackers map attack surfaces more precisely.

Why is Enumeration important for the CEH exam?

Because it turns “open ports and banners” into actionable intelligence. Enumeration frequently reveals valid accounts, misconfigurations, network shares, and service metadata that can be leveraged for privilege escalation or lateral movement—skills CEH tests with scenario-driven questions.

What types of Enumeration should I know for CEH?
  • DNS Enumeration: A/AAAA, MX, TXT, NS records; zone transfers; subdomain discovery.
  • NetBIOS / SMB: User lists, shares, sessions (enum4linux, nbtstat).
  • SNMP: Walking OIDs, community strings (snmpwalk, snmp-check).
  • LDAP / AD: Users, groups, policies (ldapsearch).
  • SMTP: User discovery via VRFY/EXPN.
  • NTP: Time and peer info; potential info leaks.
Which tools are commonly tested for Enumeration?

Nmap (NSE scripts), enum4linux, nbtscan, rpcclient, snmpwalk, snmp-check, ldapsearch, dig/nslookup, basic telnet/nc for banner grabbing, and built‑ins like net or wmic in Windows contexts.

How is Enumeration different from Scanning?

Scanning discovers live hosts, open ports, and service versions. Enumeration dives deeper to pull structured data (users, groups, shares, policies, records) from those services.

What question styles appear for the Enumeration domain in CEH?
  • Tool output interpretation (e.g., reading enum4linux or Nmap NSE results).
  • Command selection (pick the right flag/script to enumerate SNMP or LDAP).
  • Scenario-based items (identify the next best enumeration step from a given footprint).
What are common mistakes to avoid in Enumeration?
  • Skipping default/weak credentials for SNMP or network devices.
  • Ignoring DNS & reverse DNS for quick asset discovery.
  • Not enabling Nmap NSE scripts suited to detected services.
  • Failing to log commands/outputs—hurts analysis and repeatability.
How much weight does Enumeration carry in CEH?

Enumeration typically represents a meaningful portion of the exam (often seen alongside Scanning and System Hacking). Expect ~10–15% of questions to require enumeration knowledge directly or indirectly.

What’s the best way to study Enumeration for CEH?
  • Build a small lab and practice tools (DNS, SMB, SNMP, LDAP).
  • Use FlashGenius Domain Practice to drill Enumeration-only questions.
  • Reinforce terms with Flashcards and review misses via Smart Review.
  • Run Exam Simulations to test speed and accuracy under time pressure.
Where can I practice CEH Enumeration questions?

Start here: FlashGenius CEH Practice Tests – Enumeration Domain. Use Domain Practice for focused drilling and Exam Simulation for full‑length assessments.

Get Exam-Ready Faster

  • Domain Practice: Drill Enumeration questions with AI explanations.
  • Exam Simulation: Full CEH-style timed tests.
  • Flashcards & Smart Review: Cement commands, fix weak spots.

Start CEH Enumeration Practice