CEH Certified Ethical Hacker Practice Exams, Fifth Edition

  • 6h 10m
  • Matt Walker
  • McGraw-Hill/Osborne
  • 2022

Don’t Let the Real Test Be Your First Test!

Fully updated for the CEH v11 exam objectives, this practical guide contains more than 550 realistic practice exam questions to prepare you for the EC-Council’s Certified Ethical Hacker exam. To aid in your understanding of the material, in-depth explanations of both the correct and incorrect answers are provided for every question. Designed to help you pass the exam, this is the perfect companion to CEH™ Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition.

Covers all exam topics, including:

  • Ethical hacking fundamentals
  • Reconnaissance and footprinting
  • Scanning and enumeration
  • Sniffing and evasion
  • Attacking a system
  • Hacking web servers and applications
  • Wireless network hacking
  • Mobile, IoT, and OT
  • Security in cloud computing
  • Trojans and other attacks, including malware analysis
  • Cryptography
  • Social engineering and physical security
  • Penetration testing

Online test engine provides full-length practice exams and customizable quizzes by chapter or exam domain

About the Author

Matt Walker, CEH, is a cybersecurity consultant and has held several cybersecurity positions throughout his career. An IT security and education professional for more than 20 years, he has served as the director of the Network Training Center for Cisco Networking Academy on Ramstein AB, Germany, and as a network engineer for NASA’s Secure Network Systems (NSS). He continues to train and write certification and college-level IT and IA security courses.

In this Book

  • Introduction
  • Getting Started—Essential Knowledge
  • Reconnaissance—Information Gathering for the Ethical Hacker
  • Scanning and Enumeration
  • Sniffing and Evasion
  • Attacking a System
  • Web-Based Hacking—Servers and Applications
  • Wireless Network Hacking
  • Mobile Communications and the IoT
  • Security in Cloud Computing
  • Trojans and Other Attacks
  • Cryptography 101
  • Low Tech—Social Engineering and Physical Security
  • The Pen Test—Putting It All Together
  • Appendix—About the Online Content