New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 SSCP Exam - Topic 6 Question 68 Discussion

Actual exam question for ISC2's SSCP exam
Question #: 68
Topic #: 6
[All SSCP Questions]

In the context of network enumeration by an outside attacker and possible Distributed Denial of Service (DDoS) attacks, which of the following firewall rules is not appropriate to protect an organization's internal network?

Show Suggested Answer Hide Answer
Suggested Answer: A

Echo replies outbound should be dropped, not allowed. There is no reason for any internet users to send ICMP ECHO Request to your interal hosts from the internet. If they wish to find out if a service is available, they can use a browser to connect to your web server or simply send an email if they wish to test your mail service.

Echo replies outbound could be used as part of the SMURF amplification attack where someone will send ICMP echo requests to gateways broadcast addresses in order to amplify the request by X number of users sitting behind the gateway.

By allowing inbound echo requests and outbound echo replies, it makes it easier for attackers to learn about the internal network as well by performing a simply ping sweep. ICMP can also be used to find out which host has been up and running the longest which would indicates which patches are missing on the host if a critical patch required a reboot.

ICMP can also be use for DDoS attacks, so you should strictly limit what type of ICMP traffic would be allowed to flow through your firewall.

On top of all this, tools such as LOKI could be use as a client-server application to transfer files back and forward between the internat and some of your internal hosts. LOKI is a client/server program published in the online publication Phrack . This program is a working proof-of-concept to demonstrate that data can be transmitted somewhat secretly across a network by hiding it in traffic that normally does not contain payloads. The example code can tunnel the equivalent of a Unix RCMD/RSH session in either ICMP echo request (ping) packets or UDP traffic to the DNS port. This is used as a back door into a Unix system after root access has been compromised. Presence of LOKI on a system is evidence that the system has been compromised in the past.

The outbound echo request and inbound echo reply allow internal users to verify connectivity with external hosts.

The following answers are incorrect:

Allow echo request outbound The outbound echo request and inbound echo reply allow internal users to verify connectivity with external hosts.

Drop echo request inbound There is no need for anyone on the internet to attempt pinging your internal hosts.

Allow echo reply inbound The outbound echo request and inbound echo reply allow internal users to verify connectivity with external hosts.

Reference(s) used for this question:

http:// www.phrack.org/issues.html?issue=49&id=6

http:// www.phrack.org/issues.html?issue=49&id=6

STREBE, Matthew and PERKINS, Charles, Firewalls 24seven, Sybex 2000, Chapter 10: The Perfect Firewall.


Contribute your Thoughts:

0/2000 characters
Hollis
3 months ago
Totally agree with C, it’s a solid rule!
upvoted 0 times
...
Eden
3 months ago
Wait, allowing echo replies inbound? That sounds off.
upvoted 0 times
...
Deeanna
3 months ago
C is the best choice here!
upvoted 0 times
...
Queenie
3 months ago
I think B could be risky too.
upvoted 0 times
...
Son
4 months ago
D is definitely not appropriate.
upvoted 0 times
...
Stanford
4 months ago
Allowing echo reply inbound could potentially open up the network to vulnerabilities, so I'm leaning towards that being the least appropriate rule.
upvoted 0 times
...
Jacquelyne
4 months ago
I'm pretty confident that dropping echo request inbound is the best option to protect against network enumeration and DDoS attacks. That seems like the most secure choice.
upvoted 0 times
...
Linn
4 months ago
I'm a bit confused on the difference between echo request and echo reply. I'll need to review those network concepts before answering.
upvoted 0 times
...
Ceola
4 months ago
Okay, let's see... I think allowing echo reply outbound might be a bad idea, since that could potentially enable a DDoS attack.
upvoted 0 times
...
Therese
5 months ago
Hmm, this is a tricky one. I'll need to think carefully about the implications of each firewall rule.
upvoted 0 times
...
Pa
5 months ago
I recall that allowing outbound echo requests can be risky too, but I think option A is still necessary for normal operations.
upvoted 0 times
...
Angella
5 months ago
I practiced a similar question where dropping inbound requests was the right move. So, I feel like option C is definitely a good choice for protection.
upvoted 0 times
...
Myra
5 months ago
I'm not entirely sure, but I remember something about echo requests being used in network scans. Maybe option B is the wrong one?
upvoted 0 times
...
Clay
5 months ago
I think option D might be the one that's not appropriate since allowing echo replies inbound could expose the network to enumeration.
upvoted 0 times
...
Reiko
5 months ago
Okay, let me think this through. We're adding 15 days to Valentine's Day, then adding 1 year to that. I'm pretty sure the result should be March 1st, 2016.
upvoted 0 times
...
Oliva
5 months ago
Ah, I remember learning about the product breakdown structure in my project management class. I think that might be the key to answering this question correctly.
upvoted 0 times
...
Detra
5 months ago
We went over some questions about Alibaba Cloud services, and I feel like GPU monitoring was mentioned. I think the answer is true.
upvoted 0 times
...
Mignon
5 months ago
I vaguely recall a similar question about passive losses—if they exceed a certain limit, they can't all be used, right?
upvoted 0 times
...

Save Cancel