CISM Certified Information Security Manager – Question1145

An information security manager reviewing firewall rules will be MOST concerned if the firewall allows:

A.
source routing.
B. broadcast propagation.
C. unregistered ports.
D. nonstandard protocols.

Correct Answer: A

Explanation:

Explanation: If the firewall allows source routing, any outsider can carry out spoofing attacks by stealing the internal (private) IP addresses of the organization. Broadcast propagation, unregistered ports and nonstandard protocols do not create a significant security exposure.