GAQM CPEH-001 Exam
Certified Professional Ethical Hacker (CPEH) Exam (Page 18 )

Updated On: 1-Feb-2026

Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored? (Choose the best answer)

  1. symmetric algorithms
  2. asymmetric algorithms
  3. hashing algorithms
  4. integrity algorithms

Answer(s): C

Explanation:

In cryptography, a cryptographic hash function is a hash function with certain additional security properties to make it suitable for use as a primitive in various information security applications, such as authentication and message integrity. A hash function takes a long string (or 'message') of any length as input and produces a fixed length string as output, sometimes termed a message digest or a digital fingerprint.



Study the snort rule given below:



From the options below, choose the exploit against which this rule applies.

  1. WebDav
  2. SQL Slammer
  3. MS Blaster
  4. MyDoom

Answer(s): C

Explanation:

MS Blaster scans the Internet for computers that are vulnerable to its attack. Once found, it tries to enter the system through the port 135 to create a buffer overflow. TCP ports 139 and 445 may also provide attack vectors.



You have the SOA presented below in your Zone. Your secondary servers have not been able to contact your primary server to synchronize information. How long will the secondary servers attempt to contact the primary server before it considers that zone is dead and stops responding to queries? collegae.edu.SOA, cikkye.edu ipad.college.edu. (200302028 3600 3600 604800 3600)

  1. One day
  2. One hour
  3. One week
  4. One month

Answer(s): C

Explanation:

The numbers represents the following values:
200302028; se = serial number
3600; ref = refresh = 1h
3600; ret = update retry = 1h
604800; ex = expiry = 1w
3600; min = minimum TTL = 1h



Tess King is using the nslookup command to craft queries to list all DNS information (such as Name Servers, host names, MX records, CNAME records, glue records (delegation for child Domains), zone serial number, TimeToLive (TTL) records, etc) for a Domain.
What do you think Tess King is trying to accomplish? Select the best answer.

  1. A zone harvesting
  2. A zone transfer
  3. A zone update
  4. A zone estimate

Answer(s): B

Explanation:

The zone transfer is the method a secondary DNS server uses to update its information from the primary DNS server. DNS servers within a domain are organized using a master-slave method where the slaves get updated DNS information from the master DNS. One should configure the master DNS server to allow zone transfers only from secondary (slave) DNS servers but this is often not implemented. By connecting to a specific DNS server and successfully issuing the ls ­d domain-name

> file-name you have initiated a zone transfer.



A zone file consists of which of the following Resource Records (RRs)?

  1. DNS, NS, AXFR, and MX records
  2. DNS, NS, PTR, and MX records
  3. SOA, NS, AXFR, and MX records
  4. SOA, NS, A, and MX records

Answer(s): D

Explanation:

The zone file typically contains the following records:
SOA ­ Start Of Authority
NS ­ Name Server record
MX ­ Mail eXchange record
A ­ Address record



Viewing page 18 of 177
Viewing questions 86 - 90 out of 878 questions



Post your Comments and Discuss GAQM CPEH-001 exam prep with other Community members:

Join the CPEH-001 Discussion