Prepare for the Certified Ethical Hacker (CEH) certification by EC-Council with free exam-style practice questions on CyberCertPrep. The CEH exam has 125 questions, a time limit of CEH hours, and a passing score of 70%.
Choose from Practice mode, Exam Simulation, Weak Areas review, and Daily Challenge. Track your progress with detailed analytics and study with flashcards.
Certified Ethical Hacker (CEH) Exam Domain
Focus your study on this domain with targeted practice questions. This domain accounts for 12% of your CEH exam score.
The Reconnaissance Techniques domain is one of 9 exam domains on the Certified Ethical Hacker (CEH) certification exam by EC-Council. At 12% of the total exam, this domain is important but should be balanced with higher-weighted domains in your study plan.
The CEH exam consists of 125 questions with a time limit of 4 hours and a passing score of 70%. That means approximately 15 questions on your exam will come from the Reconnaissance Techniques domain.
Privilege Escalation
An attack where a user gains elevated access to resources that are normally protected, beyond what their assigned permis...
Port Scanning
A technique used to identify open ports and services available on a networked host by sending connection requests to a r...
Man-in-the-Middle (MITM)
An attack where the attacker secretly intercepts and potentially alters communications between two parties who believe t...
Social Engineering
The psychological manipulation of people into performing actions or divulging confidential information, exploiting human...
Advanced Persistent Threat (APT)
A prolonged and targeted cyberattack where a sophisticated threat actor (typically a nation-state or organized crime gro...
Brute Force Attack
An attack method that systematically tries all possible combinations of characters to crack passwords, encryption keys, ...
Spear Phishing
A targeted phishing attack directed at a specific individual, organization, or role using personalized information gathe...
Penetration Testing
An authorized simulated cyberattack on a computer system, network, or application performed to evaluate its security pos...
These certifications also cover topics related to Reconnaissance Techniques: