🔥 40% Off Crucial Exams Memberships — Deal ends today!

10 minutes, 10 seconds remaining!

Certified Ethical Hacker (CEH) Practice Question

During an incident-response call, your client's upstream provider reports that its network is being abused to launch a 40-Gbps DNS amplification attack against multiple victims. The malicious traffic carries forged source addresses that are not part of the provider's IP space. As an ethical hacker, which countermeasure should you recommend the ISP implement first to halt the spoofed traffic from leaving its network?

  • Implement BCP38/BCP84 ingress source-address filtering on customer-facing edge routers to block packets with spoofed IP sources.

  • Enable SYN cookies on all public-facing web servers.

  • Disable Path MTU Discovery on perimeter firewalls to reduce fragmentation.

  • Raise the maximum UDP payload size for DNS responses to 4096 bytes.

Certified Ethical Hacker (CEH)
Network and Perimeter Hacking
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot