Certified Ethical Hacker (CEH) Practice Question

During post-incident analysis of the massive 2016 DDoS against DNS provider Dyn, investigators noted that tightening BCP 38 source-address validation on upstream routers did not appreciably reduce the attack traffic. Which characteristic of the Mirai botnet's traffic most directly explains why this countermeasure was ineffective?

  • The bots sent high-rate traffic from their real, routable IP addresses rather than using forged source addresses.

  • The attack depended on DNS amplification that masked the true origin of packets with spoofed victim IPs.

  • Most packets were deliberately fragmented, allowing them to slip past access-control lists on the provider edge.

  • Mirai encapsulated its floods in IPv6-over-IPv4 tunnels, preventing IPv4 ingress filters from seeing the original headers.

Certified Ethical Hacker (CEH)
Network and Perimeter Hacking
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot