Summer Special Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: big60

GAQM Updated CEH-001 Exam Questions and Answers by sulaiman

Page: 28 / 32

GAQM CEH-001 Exam Overview :

Exam Name: Certified Ethical Hacker (CEH)
Exam Code: CEH-001 Dumps
Vendor: GAQM Certification: Certified Ethical Hacker CEH
Questions: 878 Q&A's Shared By: sulaiman
Question 112

A hacker is attempting to use nslookup to query Domain Name Service (DNS). The hacker uses the nslookup interactive mode for the search. Which command should the hacker type into the command shell to request the appropriate records?

Options:

A.

Locate type=ns

B.

Request type=ns

C.

Set type=ns

D.

Transfer type=ns

Discussion
Syeda
I passed, Thank you Cramkey for your precious Dumps.
Stella Aug 28, 2025
That's great. I think I'll give Cramkey Dumps a try.
Josephine
I want to ask about their study material and Customer support? Can anybody guide me?
Zayd Aug 1, 2025
Yes, the dumps or study material provided by them are authentic and up to date. They have a dedicated team to assist students and make sure they have a positive experience.
Sam
Can I get help from these dumps and their support team for preparing my exam?
Audrey Aug 11, 2025
Definitely, you won't regret it. They've helped so many people pass their exams and I'm sure they'll help you too. Good luck with your studies!
Anaya
I found so many of the same questions on the real exam that I had already seen in the Cramkey Dumps. Thank you so much for making exam so easy for me. I passed it successfully!!!
Nina Aug 19, 2025
It's true! I felt so much more confident going into the exam because I had already seen and understood the questions.
Question 113

A company firewall engineer has configured a new DMZ to allow public systems to be located away from the internal network. The engineer has three security zones set:

Untrust (Internet) – (Remote network = 217.77.88.0/24)

DMZ (DMZ) – (11.12.13.0/24)

Trust (Intranet) – (192.168.0.0/24)

The engineer wants to configure remote desktop access from a fixed IP on the remote network to a remote desktop server in the DMZ. Which rule would best fit this requirement?

Options:

A.

Permit 217.77.88.0/24 11.12.13.0/24 RDP 3389

B.

Permit 217.77.88.12 11.12.13.50 RDP 3389

C.

Permit 217.77.88.12 11.12.13.0/24 RDP 3389

D.

Permit 217.77.88.0/24 11.12.13.50 RDP 3389

Discussion
Question 114

A network security administrator is worried about potential man-in-the-middle attacks when users access a corporate web site from their workstations. Which of the following is the best remediation against this type of attack?

Options:

A.

Implementing server-side PKI certificates for all connections

B.

Mandating only client-side PKI certificates for all connections

C.

Requiring client and server PKI certificates for all connections

D.

Requiring strong authentication for all DNS queries

Discussion
Question 115

Which of the following is an example of two factor authentication?

Options:

A.

PIN Number and Birth Date

B.

Username and Password

C.

Digital Certificate and Hardware Token

D.

Fingerprint and Smartcard ID

Discussion
Page: 28 / 32
Title
Questions
Posted

CEH-001
PDF

$42  $104.99

CEH-001 Testing Engine

$50  $124.99

CEH-001 PDF + Testing Engine

$66  $164.99