CCIE Practice Test 2026 – Complete Exam Prep Resource

Question: 1 / 400

What are three technologies that can be used to trace the source of an attack in a network?

Remotely-triggered destination-based black holing

ICMP Unreachable messages

Sinkholes

Using sinkholes is an effective method for tracing the source of an attack in a network. Sinkholes are a type of security mechanism where malicious or unwanted traffic is redirected to a controlled environment. This allows network administrators to analyze the traffic patterns, identify the source IP addresses involved in the attack, and gather intelligence about the attack methods. By examining the captured data, organizations can better understand the attack vectors and take appropriate defensive measures.

The other technologies listed, while related to network security and operational responses, serve different purposes that do not primarily focus on tracing the origin of attacks. For instance, remotely-triggered destination-based black holing is generally used to drop unwanted traffic instead of tracing its source. ICMP Unreachable messages help communicate issues with routing or connectivity but do not provide specific source tracing capabilities. Traffic scrubbing focuses on filtering out malicious traffic but is more about mitigation than tracing origins.

Get further explanation with Examzify DeepDiveBeta

Traffic scrubbing

Next Question

Report this question

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy