An information security manager reviewing firewall rules will be MOST concerned if the firewall
allows:
A.
source routing.
B.
broadcast propagation.
C.
unregistered ports.
D.
nonstandard protocols.
Explanation:
If the firewall allows source routing, any outsider can carry out spoofing attacks by stealing the
internal (private) IP addresses of the organization. Broadcast propagation, unregistered ports and
nonstandard protocols do not create a significant security exposure.