Certified Ethical Hacker (CEH) Practice Question

After your customer discovered that several of its Internet-facing NTP and memcached servers were abused to launch a 1 Tbps reflection/amplification DDoS against other victims, you are asked which single network-layer control would have most effectively prevented the organization from being used as a reflector. What should you recommend?

  • Enable TCP SYN cookies on edge firewalls to defend against half-open connection floods.

  • Lower the MTU on all perimeter interfaces to 576 bytes to minimize the size of outgoing packets.

  • Block all inbound ICMP echo-request traffic at the perimeter to eliminate Smurf-style attacks.

  • Apply strict egress filtering to discard any outbound packet that carries a source IP address not assigned to the organization (BCP 38).

Certified Ethical Hacker (CEH)
Network and Perimeter Hacking
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot