Prepare for the Certified Ethical Hacker (CEH) certification by EC-Council with free exam-style practice questions on CyberCertPrep. The CEH exam has 125 questions, a time limit of CEH hours, and a passing score of 70%.
Choose from Practice mode, Exam Simulation, Weak Areas review, and Daily Challenge. Track your progress with detailed analytics and study with flashcards.
Certified Ethical Hacker (CEH) Exam Domain
Focus your study on this domain with targeted practice questions. This domain accounts for 10% of your CEH exam score.
The Cryptography & Social Engineering domain is one of 9 exam domains on the Certified Ethical Hacker (CEH) certification exam by EC-Council. At 10% of the total exam, this domain is important but should be balanced with higher-weighted domains in your study plan.
The CEH exam consists of 125 questions with a time limit of 4 hours and a passing score of 70%. That means approximately 13 questions on your exam will come from the Cryptography & Social Engineering domain.
Encryption
The process of converting plaintext data into an unreadable format (ciphertext) using a cryptographic algorithm and key,...
Hashing
A one-way function that converts input data of any size into a fixed-length string of characters (hash value or digest),...
Public Key Infrastructure (PKI)
A set of roles, policies, hardware, software, and procedures needed to create, manage, distribute, use, store, and revok...
Digital Certificate
An electronic document issued by a Certificate Authority (CA) that binds a public key to an entity's identity, enabling ...
AES (Advanced Encryption Standard)
A symmetric block cipher algorithm adopted by the U.S. government as the standard for encrypting electronic data, replac...
TLS (Transport Layer Security)
A cryptographic protocol designed to provide secure communication over a computer network by encrypting data in transit ...
Digital Signature
A cryptographic technique that uses asymmetric encryption to verify the authenticity, integrity, and non-repudiation of ...
Phishing
A social engineering attack that uses fraudulent emails, text messages (smishing), or phone calls (vishing) to trick use...
These certifications also cover topics related to Cryptography & Social Engineering: