PM
CERTIFIED ETHICAL HACKER (CEH) V.10 PRACTICE QUESTIONS AND
ANSWERS WITH COMPLETE SOLUTIONS VERIFIED LATEST UPDATE
2025/2026
Terms in this set (107)
Which of the following C. A guard posted outside the door.
is the best example of
a deterrent control?
Deterrents have to be visible to prevent an
A. A log aggregation
attack. A guard visible outside the door could
system
help prevent physical attacks.
B. Hidden cameras onsite.
C. A guard posted outside
the door.
D. Backup recovery
systems.
Enacted in 2002, this US A. FISMA (Federal Information Security Management Act)
law requires every
federal agency to FISMA has been around since 2002 and was
implement updated in 2014. It gave information security
information security responsibilities to NIST, OMB, and other
programs, including government agencies, and declared
significant reporting on
1/73
,6/28/25, 2:12
PM
compliance and
accreditation. Which of the Department of Homeland Security (DHS)
the following is the as the operational lead for budgets and
best choice for this guidelines on security matters.
definition?
A. FISMA
B. HIPAA
C. NIST 800-53
D. OSSTMM
2/73
,6/28/25, 2:12
PM
Brad has done some B. $207.50
research and
determined that a ARO = 1 Occurrence/10 years = 0.1
certain set of systems
SLE = $1200 + (5 x 50 = 250) + (5 x 5 x 25 = 625) = $2075
on his network fail
$2075 x 0.1 = $207.50
once every ten years.
The purchase price for
each of these
sy stems is $1200. Brad
also discovers that the
admins on staff, who earn
$50 an hour, estimate
five hours to replace a
machine. Five
employees, earning $25
an hour, depend on
each system and will be
completely
unproductive while it's
down. What is the ALE
of these devices?
A. $2075
B. $207.50
C. $120
3/73
, 6/28/25, 2:12
PM
D. $1200
An ethical hacker is hired A. A white hat is attempting a black box test.
to test the
security of a business An ethical hacker hired under a specific agreement is a
network. The CEH is white hat.
given no prior
knowledge of the
network and has a
specific framework in
which to work, defining
boundaries, NDAs, and
the completion data.
Which of the following
is a true statement?
A. A white hat is
attempting a black box
test.
B. A white hat is
attempting a white box
test.
C. A black hat is
attempting a black box
test.
D. A black hat is
attempting a gray box
4/73