(CEH) Certified Executive Housekeeper Practice Test

โ–ถ

CEH ethical hacking โ€” the discipline validated by EC-Council's Certified Ethical Hacker credential โ€” teaches security professionals to think, reason, and act like malicious hackers while operating entirely within legal boundaries and with explicit organizational permission.

The CEH certification has become the most widely recognized ethical hacking credential in the cybersecurity industry, used by penetration testers, red teamers, security analysts, and incident responders to demonstrate structured offensive security knowledge. Understanding what CEH ethical hacking covers โ€” and why employers value it โ€” helps you decide whether the certification aligns with your career goals.

The term ethical hacking refers to authorized attempts to penetrate systems, networks, and applications to discover security vulnerabilities before malicious actors do. Ethical hackers follow the same methodology as adversarial attackers โ€” reconnaissance, scanning, gaining access, maintaining access, and covering tracks โ€” but with written authorization, defined scope, and a commitment to report findings to the organization rather than exploit them. CEH formalizes this methodology into a testable curriculum covering 20 domains, from footprinting and reconnaissance through cryptography and cloud computing security.

EC-Council designed CEH to validate practical offensive security knowledge at a level suitable for security professionals transitioning into penetration testing, for IT administrators who need to understand attack vectors to defend against them, and for candidates building toward more advanced certifications like OSCP or GPEN.

CEH is not an entry-level credential โ€” EC-Council requires either five years of information security experience or completion of official EC-Council training before sitting the exam. This prerequisite filters the certification toward professionals with real-world security context rather than complete beginners.

The CEH exam structure reflects this experienced-candidate positioning. The standard CEH Knowledge exam contains 125 multiple-choice questions to be completed in four hours, with a passing score that varies by exam form (typically 60โ€“85% depending on difficulty calibration). A practical component โ€” the CEH Practical โ€” tests candidates in a six-hour hands-on lab environment where they must solve 20 real-world challenges using ethical hacking techniques. Earning both Knowledge and Practical credentials confers the CEH Master designation, the most comprehensive CEH achievement level.

The ethical hacking profession sits at the intersection of deep technical knowledge and professional accountability. Unlike general IT security roles that focus primarily on defensive controls โ€” firewalls, endpoint protection, access management โ€” ethical hackers actively simulate the adversary perspective to identify weaknesses before they can be exploited.

This offensive orientation requires a different mindset: thinking about systems not as things to protect from the outside but as things to understand from the inside, asking not just how a system should work but how it can be made to behave unexpectedly. CEH formalizes that adversarial thinking into a structured, teachable methodology.

Organizations invest in ethical hacking services because the alternative โ€” discovering vulnerabilities through actual breaches โ€” is far more costly. The average cost of a data breach exceeded $4.4 million in 2023 according to IBM Security research, while the cost of a penetration testing engagement that discovers and remediates the same vulnerability is a fraction of that.

CEH-certified professionals provide organizations with evidence-based assurance that their security controls hold up against real attacker techniques, rather than the theoretical assurance that compliant policies alone provide. This risk-reduction value proposition drives consistent employer demand for certified ethical hackers across financial services, healthcare, government, and technology industries.

The CEH certification ecosystem has expanded beyond the core Knowledge exam to include specialized credentials. EC-Council offers CEH Practical (a 6-hour hands-on exam), CEH Master (both Knowledge + Practical), and specialty modules in areas like mobile hacking and web application penetration testing.

This progression means CEH holders can signal increasing depth without switching to a completely different credential family. For employers running large security operations, the structured EC-Council career ladder provides a familiar framework for evaluating candidate qualifications at each experience level from analyst through senior penetration tester.

CEH Exam at a Glance

125 MC
Questions
4 Hours
Duration
60โ€“85%
Passing Score
3 Years
Validity
$950โ€“$1,199
Cost
20 Modules
Domains

The CEH curriculum's 20 domains cover every phase of the ethical hacking methodology with dedicated technical depth. Module 1 introduces ethical hacking concepts, security laws, and the legal framework that distinguishes authorized penetration testing from criminal activity.

Modules 2 through 5 cover footprinting and reconnaissance, scanning networks, enumeration, and vulnerability analysis โ€” the information-gathering and target-profiling phases that precede any actual attack. These phases are often underestimated by students new to ethical hacking; skilled attackers invest enormous time in passive and active reconnaissance to build a complete target profile before attempting exploitation.

Modules 6 through 8 cover system hacking โ€” gaining access, escalating privileges, maintaining persistence, and covering tracks. This is where candidates learn password cracking techniques (brute force, dictionary attacks, rainbow tables), privilege escalation paths in Windows and Linux, rootkit installation, log tampering, and steganography for data exfiltration. Module 9 covers social engineering โ€” phishing, vishing, impersonation, and physical security bypasses โ€” which remains one of the most effective attack vectors against organizations regardless of their technical security maturity.

Modules 10 through 13 address denial of service attacks, session hijacking, evading intrusion detection systems, and hacking web servers. Module 14 covers web application hacking including SQL injection, XSS (cross-site scripting), CSRF, and parameter tampering โ€” vulnerabilities covered by the OWASP Top 10 that persist across virtually all industries.

Modules 15 and 16 address SQL injection in depth and hacking wireless networks including WEP, WPA, and WPA2 cracking techniques. Module 17 focuses on mobile platform security for iOS and Android, while Module 18 covers IoT and OT (operational technology) security.

The final two modules address cloud computing and cryptography โ€” both increasingly prominent in modern enterprise environments. Cloud security covers AWS, Azure, and Google Cloud attack surfaces including misconfigured storage buckets, insecure APIs, and identity and access management weaknesses. Cryptography covers encryption algorithms, hashing, digital signatures, PKI infrastructure, and cryptographic attacks. Understanding cryptography at the conceptual level CEH tests is essential for evaluating whether security controls actually protect sensitive data or merely create the appearance of protection.

The hacking methodology taught in CEH โ€” sometimes called the ethical hacking lifecycle โ€” mirrors the attack chains documented in real breaches. Academic understanding of this lifecycle is what distinguishes an ethical hacker from a script kiddie who runs tools without understanding their underlying mechanics. Footprinting answers: what is the target? Scanning answers: what is running and potentially vulnerable?

Enumeration answers: what specific services, accounts, and configurations exist? Vulnerability analysis answers: which known weaknesses apply to this specific environment? Exploitation answers: which vulnerabilities are actually exploitable given the target's configuration? Post-exploitation answers: what access has been gained and where can it lead? Maintaining access answers: how would a persistent attacker preserve their foothold? Reporting answers: how do these findings translate into actionable remediation for the organization?

CEH's breadth distinguishes it from more narrowly scoped security certifications. A candidate who completes CEH prep has at least conceptual familiarity with SQL injection, wireless cracking, social engineering, cloud misconfigurations, cryptographic weaknesses, mobile app vulnerabilities, and IoT device attacks โ€” attack surfaces that a single-domain specialist may never touch.

This breadth makes CEH-certified professionals valuable in security consulting roles where any given client engagement might surface unexpected attack vectors outside the primary scope. The ability to recognize a vulnerability type outside your primary specialization and escalate appropriately is a genuine professional competency that CEH's 20-domain curriculum develops.

Practice CEH Introduction Questions

Preparing for the CEH exam requires a different study approach than most IT certifications. Because CEH tests tool knowledge alongside conceptual understanding, candidates need hands-on practice with ethical hacking tools โ€” not just reading about them.

EC-Council's official iLabs environment provides browser-based lab access where candidates can practice with Metasploit, Wireshark, Nmap, Burp Suite, John the Ripper, Hydra, and dozens of other tools commonly tested. Allocating at least 30โ€“40% of your study time to lab exercises rather than passive reading significantly improves exam performance and, more importantly, builds the practical skills that make CEH certification credible to employers.

Study resources for CEH divide into official and third-party tracks. EC-Council's official courseware is thorough but expensive โ€” the full training program can cost several thousand dollars. Mat Walker's CEH video courses on Pluralsight or similar platforms offer structured content at lower cost.

The CEH All-in-One Exam Guide by Matt Walker is the most widely recommended self-study book, covering all 20 domains with chapter-end practice questions. Supplementing any study track with practice exams is essential โ€” the CEH exam's four-hour duration and scenario-based MC questions require stamina and question-phrasing familiarity that content review alone doesn't build.

See the complete CEH certification overview for a detailed breakdown of exam eligibility, registration process, and EC-Council's official study tracks. Career and salary information appears in the CEH career guide, which covers the compensation range for CEH-certified professionals across penetration testing, security engineering, and threat intelligence roles.

Hands-on lab environments matter enormously for CEH preparation. Reading about how Metasploit exploits a vulnerable service is categorically different from actually running the exploit against a deliberately vulnerable target and watching the session open. The cognitive and muscle-memory learning that comes from hands-on practice transfers to exam performance in ways that passive reading doesn't โ€” scenario questions that describe a specific tool behavior or output become intuitive when you've seen that behavior firsthand in a lab.

EC-Council's official iLabs environment provides 519+ real-world lab exercises, though access requires purchasing official training. Free alternatives include TryHackMe (which has CEH-specific learning paths), Hack The Box (more advanced), and building a local lab with VirtualBox running intentionally vulnerable machines like Metasploitable or DVWA (Damn Vulnerable Web Application).

Practice questions that specifically test tool behavior โ€” rather than general security concepts โ€” are the most valuable CEH exam prep resource after actual labs. Questions like "Which Nmap scan type is most useful for firewall evasion?" or "What Metasploit command is used to list available exploits for a specific service?" test the tool familiarity that passive reading develops slowly and hands-on practice develops quickly.

When reviewing incorrect practice questions, always trace back to the underlying tool behavior or hacking technique being tested โ€” understanding why the correct answer is correct solidifies retention far better than simply memorizing it.

Core CEH Tool Categories

๐Ÿ”ด Reconnaissance Tools

Maltego (link analysis), Shodan (internet-connected device search), Recon-ng (modular OSINT framework), theHarvester (email/domain enumeration from public sources).

๐ŸŸ  Scanning Tools

Nmap (port/OS/service scanning), Nessus (vulnerability scanner), OpenVAS (open-source vuln scanner), Zenmap (Nmap GUI). Core for enumeration and attack surface mapping.

๐ŸŸก Exploitation Frameworks

Metasploit Framework (exploit delivery and payload management), BeEF (browser exploitation), SQLmap (automated SQL injection). CEH tests conceptual use โ€” not deep exploit development.

๐ŸŸข Password Attack Tools

John the Ripper (offline password cracking), Hydra (online brute force), Hashcat (GPU-accelerated hash cracking), Mimikatz (Windows credential extraction).

๐Ÿ”ต Web App Testing

Burp Suite (web proxy, scanner, intruder), OWASP ZAP (open-source web scanner), SQLmap, Nikto (web server scanner). Critical for Modules 13โ€“14.

๐ŸŸฃ Wireless Tools

Aircrack-ng suite (WEP/WPA cracking), Wireshark (packet capture and analysis), Kismet (wireless network detection), Wifite (automated wireless auditing).

Practice CEH Scanning Network Questions

CEH Career and Salary Information

๐Ÿ“‹ Career Paths

CEH-certified professionals work in roles that involve offensive security operations, security assessment, and defensive security informed by attacker knowledge. Penetration tester is the most directly aligned career path โ€” CEH validates the systematic methodology and tool knowledge that penetration testing engagements require. Ethical hackers on penetration testing teams typically work from defined scopes, conduct assessments against specific targets, and produce detailed reports that guide remediation.

Security analysts and incident responders leverage CEH knowledge to understand attacker behavior, trace intrusion timelines, and identify indicators of compromise that match known attack patterns. Threat intelligence analysts use the attacker-methodology framework to model adversary behavior and anticipate attack vectors before they materialize. Red team operators โ€” who simulate sophisticated adversaries for large enterprises โ€” use CEH knowledge as a foundation, often extending into more advanced offensive techniques through supplemental certifications and independent research.

Government and defense contractor roles frequently list CEH as a preferred or required qualification under DoD 8570/8140 policy, which mandates specific certifications for information assurance roles supporting Department of Defense systems. CEH maps to the IAT Level II and IASAE Level I categories, making it relevant for federal employment and contractor positions. This government demand is a significant driver of CEH's continued relevance despite competition from certifications like OSCP that are more technically rigorous.

๐Ÿ“‹ Salary Ranges

CEH-certified professionals command salaries that reflect their specialized offensive security knowledge. Entry-level security analysts with CEH certification typically earn $65,000โ€“$85,000 annually in the US, while mid-career penetration testers with CEH and practical experience earn $95,000โ€“$130,000. Senior penetration testers, red team leads, and security engineers with CEH and additional certifications (OSCP, GPEN, GWAPT) reach $130,000โ€“$180,000 in competitive markets.

Geographic variation significantly affects CEH salary ranges. San Francisco Bay Area, Washington DC (particularly for government/contractor roles), New York, and Seattle command premium compensation โ€” 20โ€“40% above national averages for equivalent experience levels. Remote work has compressed some of these geographic premiums, allowing skilled professionals in lower cost-of-living areas to earn near-coastal compensation when working for nationally distributed security teams.

Consulting and contract CEH work often yields higher effective hourly rates than salaried employment. Penetration testing consultants billing at $150โ€“$250 per hour for client engagements can exceed $200,000 annually if fully utilized. Independent consultants manage their own business development, insurance, and benefits overhead, but the income ceiling is substantially higher for those who build a client base. EC-Council's CEH credential provides the external validation that consulting clients use to evaluate a penetration tester's qualifications.

๐Ÿ“‹ CEH vs. OSCP

The CEH vs. OSCP comparison is one of the most common questions in the ethical hacking certification space. CEH is a knowledge-based credential โ€” multiple-choice questions test breadth of understanding across 20 domains. OSCP (Offensive Security Certified Professional) is a performance-based credential โ€” candidates must compromise a set of machines in a 24-hour hands-on exam with no assistance. Most hiring managers in penetration testing roles consider OSCP more technically rigorous and a stronger signal of actual hacking ability.

CEH's advantages over OSCP include broader employer recognition across all industries (not just specialized security firms), alignment with government and military certification frameworks (DoD 8570), shorter exam duration (4 hours vs. 24 hours), and no requirement to maintain a lab environment during preparation. CEH is also more accessible to candidates with security knowledge but limited hands-on penetration testing experience, since OSCP preparation requires substantial lab time that can be prohibitive for working professionals.

The optimal path for serious ethical hacking practitioners is typically CEH first โ€” to build structured methodology knowledge, gain government framework alignment, and satisfy employer prerequisites โ€” followed by OSCP to develop and demonstrate hands-on exploitation skills. Candidates who complete both certifications are well-positioned for senior penetration testing roles, red team positions, and specialized offensive security consulting engagements at the highest compensation levels in the field.

The legal and ethical framework surrounding ethical hacking is arguably as important as the technical skills. Penetration testers who operate outside explicitly authorized scope โ€” even with good intentions โ€” risk criminal prosecution under computer fraud statutes including the Computer Fraud and Abuse Act (CFAA) in the United States and equivalent laws in other jurisdictions.

A well-drafted statement of work, scope of work document, and rules of engagement agreement define the legal boundary of an ethical hacking engagement. CEH training covers these frameworks because a technically skilled penetration tester who violates scope boundaries can cause more harm than the vulnerabilities they're authorized to find.

Bug bounty programs represent a formalized ethical hacking opportunity where companies publicly invite security researchers to test their systems under defined rules. Platforms like HackerOne, Bugcrowd, and Synack connect companies with vetted security researchers and provide a legal framework for vulnerability disclosure. CEH-certified professionals increasingly participate in bug bounty programs as a way to earn income, develop practical skills against real targets, and build a portfolio of responsible disclosures. Active bug bounty participation is a strong portfolio addition that complements formal certifications in job applications.

Continuing education maintains CEH validity, which expires after three years. EC-Council requires 120 EC-Council Continuing Education (ECE) credits over the three-year period to renew without retaking the exam. ECE credits come from attending security conferences, completing EC-Council courses, publishing security research, and participating in approved training activities. Maintaining an active commitment to professional development โ€” not just collecting credits for renewal โ€” keeps CEH practitioners current with the evolving threat landscape that the certification is designed to address.

The threat landscape that CEH covers continues evolving, which is why EC-Council updates the CEH curriculum with major version releases. CEH v12 (the current version as of 2024) added dedicated coverage of AI-powered hacking tools, attacks on machine learning systems, and updated cloud security content reflecting the maturation of AWS, Azure, and GCP attack surfaces.

Previous versions underrepresented these areas; the v12 update brought CEH current with the attack techniques documented in recent threat intelligence reports. Candidates preparing for CEH should confirm they're studying v12 content, as older books and courses covering v11 or earlier may miss newly added exam topics.

Building a professional identity as a CEH ethical hacker extends beyond passing the exam. Contributing to the security community โ€” writing vulnerability disclosures on bug bounty platforms, presenting at local BSides conferences, contributing to open-source security tools, or mentoring candidates preparing for their first security certification โ€” builds reputation and professional relationships that compound over a career.

The security community is tightly networked; professionals known for quality contributions and responsible disclosure are sought out for consulting opportunities, speaking engagements, and job referrals that don't appear on public job boards. CEH provides the credential that opens the first professional doors; the community involvement that follows determines how far through those doors you go.

Ethical hacking careers reward continuous skill development more than most IT specializations. The adversarial nature of the field means attackers constantly develop new techniques, requiring defenders and offensive security professionals alike to update their knowledge. Candidates who approach CEH as a fixed body of knowledge to memorize rather than a foundation for ongoing learning will find their skills decaying within a few years of certification.

The most effective CEH practitioners treat the credential as a structured starting point โ€” the certification proves baseline competency, while the years of hands-on practice, conference learning, and peer knowledge exchange that follow build the expertise that earns the highest-value career opportunities.

EC-Council Experience Requirement

EC-Council requires candidates to have at least 2 years of information security work experience to sit for CEH without completing official EC-Council training. Without the experience prerequisite, you must complete an approved training program before registering for the exam. The experience requirement can be waived through EC-Council's accredited training โ€” attending an authorized training center or completing the official courseware satisfies the prerequisite regardless of work experience. Apply for eligibility verification through the EC-Council website before purchasing your exam voucher.

CEH Exam Preparation Checklist

Verify eligibility: 2 years experience OR complete EC-Council training
Study all 20 CEH domains โ€” don't skip Cloud or Cryptography modules
Complete hands-on labs with actual tools (Metasploit, Nmap, Burp Suite)
Take at least 3 full 125-question practice exams under 4-hour time limits
Score 80%+ consistently on practice tests before scheduling real exam
Understand legal frameworks: Rules of Engagement, CFAA, responsible disclosure
Register through EC-Council's official portal or authorized testing center
Bring valid government-issued photo ID on exam day

Is CEH Worth Getting?

Pros

  • Most widely recognized ethical hacking certification by non-specialist employers
  • Aligned with DoD 8570/8140 โ€” required for many government and contractor roles
  • Comprehensive curriculum covers all 20 ethical hacking domains systematically
  • CEH Master (Knowledge + Practical) is a strong combined credential
  • EC-Council's training ecosystem provides official labs and courseware
  • Recognized globally across 145+ countries, not US-centric

Cons

  • High exam cost ($950โ€“$1,199) compared to alternatives
  • Knowledge-based exam โ€” multiple choice doesn't fully test hands-on ability
  • OSCP considered more credible for technical penetration testing roles
  • 3-year renewal requires 120 ECE credits โ€” ongoing time investment
  • Prerequisite experience or training requirement adds cost for beginners

CEH Ethical Hacking Questions and Answers

What does CEH ethical hacking cover?

CEH covers 20 domains: ethical hacking introduction, footprinting and reconnaissance, scanning networks, enumeration, vulnerability analysis, system hacking, malware threats, social engineering, denial of service, session hijacking, IDS/firewall evasion, web server hacking, web application hacking, SQL injection, wireless network hacking, mobile platform security, IoT security, cloud computing security, and cryptography.

How hard is the CEH exam?

CEH is considered moderately difficult โ€” harder than entry-level certifications like CompTIA Security+, easier than performance-based credentials like OSCP. Candidates with security experience typically need 2โ€“3 months of dedicated preparation. The four-hour, 125-question exam tests broad knowledge, and the variable passing score (60โ€“85% depending on exam difficulty) means consistent practice across all 20 domains is essential.

What is the CEH exam cost?

The CEH Knowledge exam costs approximately $950โ€“$1,199 USD through Pearson VUE, depending on region and whether you purchase through EC-Council directly or an authorized training center. EC-Council also offers the CEH Practical exam separately (approximately $500). Bundled training + exam packages from authorized training providers can cost $2,000โ€“$4,000 but include official courseware and lab access.

Does CEH require work experience?

Yes. EC-Council requires candidates to have at least 2 years of information security experience to sit for the CEH exam without official training. Candidates without the experience requirement can satisfy the prerequisite by completing an EC-Council authorized training program, which serves as the experience substitute regardless of actual work history.

Is CEH or OSCP better for penetration testing jobs?

For specialized penetration testing firms and offensive security roles, OSCP is generally considered more credible because it tests hands-on exploitation in a 24-hour live exam. For broader industry roles, government positions, and employers less specialized in security, CEH is more widely recognized. Many serious practitioners pursue both: CEH for breadth and employer recognition, OSCP for technical depth.

How long is CEH valid?

CEH certification is valid for three years. To renew without retaking the exam, holders must earn 120 EC-Council Continuing Education (ECE) credits during the three-year period. ECE credits can be obtained through security conferences, EC-Council training, publishing research, and other approved professional development activities.

What salary does a CEH certification support?

CEH-certified professionals in penetration testing and security analysis roles typically earn $65,000โ€“$130,000+ in the US, depending on experience level, geographic location, and specialization. Senior penetration testers and red team operators with CEH plus OSCP or GPEN can reach $150,000โ€“$180,000 in competitive markets. Government and defense contractor roles add consistent demand that supports strong compensation.

What is CEH Practical?

CEH Practical is a six-hour hands-on exam where candidates solve 20 real-world ethical hacking challenges in a live lab environment. Unlike the multiple-choice Knowledge exam, CEH Practical tests actual tool use and hacking methodology application. Candidates who pass both Knowledge and Practical exams earn the CEH Master designation โ€” EC-Council's highest CEH achievement level.

Can beginners get CEH?

CEH is not designed for complete beginners. EC-Council requires either 2 years of security work experience or completion of official training. Beginners new to cybersecurity should typically start with CompTIA Security+ or Network+ before pursuing CEH. Candidates with IT administration backgrounds who understand networking, operating systems, and basic security concepts can transition into CEH with 6โ€“12 months of foundational learning.

What tools does CEH test?

CEH tests knowledge of tools across all attack phases: Nmap and Nessus (scanning), Metasploit (exploitation), Burp Suite and SQLmap (web app testing), Wireshark (packet analysis), Aircrack-ng (wireless), John the Ripper and Hydra (password cracking), Maltego and theHarvester (reconnaissance), and many others. Hands-on familiarity with these tools through iLabs or a personal lab environment significantly improves exam performance.
โ–ถ Start Quiz