An information security manager reviewing firewall rules will be MOST concerned if the firewall allows:

An information security manager reviewing firewall rules will be MOST concerned if the firewall
allows:

An information security manager reviewing firewall rules will be MOST concerned if the firewall
allows:

A.
source routing.

B.
broadcast propagation.

C.
unregistered ports.

D.
nonstandard protocols.

Explanation:

If the firewall allows source routing, any outsider can carry out spoofing attacks by stealing the
internal (private) IP addresses of the organization. Broadcast propagation, unregistered ports and
nonstandard protocols do not create a significant security exposure.



Leave a Reply 0

Your email address will not be published. Required fields are marked *