New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 SSCP Exam - Topic 1 Question 34 Discussion

Actual exam question for ISC2's SSCP exam
Question #: 34
Topic #: 1
[All SSCP Questions]

Which of the following firewall rules found on a firewall installed between an organization's internal network and the Internet would present the greatest danger to the internal network?

Show Suggested Answer Hide Answer
Suggested Answer: C

Any opening of an internal network to the Internet is susceptible of creating a new vulnerability.

Of the given rules, the one that permits all inbound tcp connections is the less likely to be used since it amounts to almost having no firewall at all, tcp being widely used on the Internet.

Reference(s) used for this question:

ALLEN,

Julia H., The CERT Guide to System and Network Security Practices, Addison-Wesley, 2001, Appendix B, Practice-Level Policy Considerations (page 409).


Contribute your Thoughts:

0/2000 characters
Ettie
4 months ago
Really? I didn't think tcp connections could be that dangerous!
upvoted 0 times
...
Dorsey
4 months ago
Wait, isn't D also a huge risk? Logging can be exploited.
upvoted 0 times
...
Jestine
4 months ago
Permit all traffic? That's just asking for trouble!
upvoted 0 times
...
Alesia
4 months ago
I think B is pretty risky too, though.
upvoted 0 times
...
Augustine
5 months ago
C is definitely the worst option here.
upvoted 0 times
...
Edwin
5 months ago
I feel like allowing all inbound TCP connections is definitely the worst choice, but I wonder if the syslog rule could also be a concern if not properly secured.
upvoted 0 times
...
Annabelle
5 months ago
If I remember correctly, permitting all traffic between local hosts is generally safe, but it could still lead to issues if there's a compromised device.
upvoted 0 times
...
Truman
5 months ago
I think I saw a practice question about SSH traffic being risky, but I can't recall if it's worse than allowing all TCP connections.
upvoted 0 times
...
Eden
5 months ago
I remember discussing how allowing all inbound TCP connections could expose the network to various attacks, but I'm not entirely sure if that's the most dangerous option here.
upvoted 0 times
...
Carey
5 months ago
Ah, this is a tricky one. I'm not totally confident, but I'm leaning towards B. Misconfigured SSL/TLS can definitely leave data in motion vulnerable to attacks. I'll make sure to review my notes on IoT security best practices before answering.
upvoted 0 times
...
Timothy
5 months ago
Hmm, I think the key here is making sure the on-premises applications can only access the Google APIs through the Cloud Interconnect and not the public internet. Option D seems to address that directly.
upvoted 0 times
...
Toshia
5 months ago
This seems straightforward. Alibaba Cloud's Kubernetes service can integrate and manage Kubernetes clusters hosted anywhere, not just on their own cloud platform.
upvoted 0 times
...

Save Cancel