An information security manager reviewing firewall rules will be MOST concerned if the firewall allows:
A.
source routing.
B.
broadcast propagation.
C.
unregistered ports.
D.
nonstandard protocols.
Explanation:
If the firewall allows source routing, any outsider can carry out spoofing attacks by stealing the internal (private)
IP addresses of the organization. Broadcast propagation, unregistered ports and nonstandard protocols do not create a significant security exposure.