Certified Ethical Hacker (CEH) Practice Question

While monitoring egress DNS queries, you notice multiple infected workstations attempt to resolve dozens of seemingly random 16-character subdomains under various TLDs every 10 minutes. The requests are intercepted by your DNS sinkhole. Which botnet command-and-control technique are you observing, and why does it hinder traditional takedown methods?

  • Fast-flux hosting that rapidly changes the IP addresses behind a single, constant domain name to frustrate IP-based blocking.

  • A peer-to-peer command channel based on a distributed hash table, eliminating the need for any central domain name.

  • Use of a domain generation algorithm that continually produces new C2 domains, making it impractical to blacklist or seize them all.

  • Malware containing a hard-coded list of static C2 IP addresses, forcing defenders to block each address individually.

Certified Ethical Hacker (CEH)
Network and Perimeter Hacking
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot