An information security manager reviewing firewall rule…

An information security manager reviewing firewall rules will be MOST concerned if the firewall allows:

An information security manager reviewing firewall rules will be MOST concerned if the firewall allows:

A.
source routing.

B.
broadcast propagation.

C.
unregistered ports.

D.
nonstandard protocols.

Explanation:

If the firewall allows source routing, any outsider can carry out spoofing attacks by stealing the internal (private)
IP addresses of the organization. Broadcast propagation, unregistered ports and nonstandard protocols do not create a significant security exposure.



Leave a Reply 0

Your email address will not be published. Required fields are marked *