Certified Incident Handler (CIH) Practice Ecam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which technique involves blocking traffic from a "bogon list" composed of unused or reserved IP addresses?

  1. RFC 3704 filtering

  2. IPSec tunneling

  3. DNSSEC validation

  4. Port scanning

The correct answer is: RFC 3704 filtering

The technique of blocking traffic from a "bogon list," which consists of unused or reserved IP addresses, is known as RFC 3704 filtering. This approach is based on the standards defined in RFC 3704, which advises network operators to filter out packets that originate from bogon IP addresses. These addresses are typically not allocated to any organization and should never appear on the public Internet. By implementing RFC 3704 filtering, organizations can enhance their security posture by reducing the risk of malicious traffic and ensuring that their networks are not inadvertently interacting with potentially harmful sources. This technique is crucial in preventing various types of attacks, such as IP spoofing, where an attacker tries to impersonate a legitimate source by using a reserved or unused IP address. Thus, by filtering these bogus addresses, network security is significantly improved. In contrast, the other techniques mentioned—IPSec tunneling, DNSSEC validation, and port scanning—serve different purposes. IPSec tunneling is used to secure IP communications by encrypting data packets, while DNSSEC validation helps ensure the integrity and authenticity of domain name system responses. Port scanning is a technique used to identify open ports on a device but does not relate to blocking unwanted traffic based on IP address legitimacy.