Next Question

You maintain an extremely protective policy when configuring your firewall rules. Your security policy denies all inbound connection requests to your corporate network.

How is it possible that you still experience remote exploits your adversaries are using to obtain interactive sessions inside your firewall?

A.
TCP splicing is easy to do.

B.
Internal software may be vulnerable.

C.
UDP vulnerabilities are well-known and exploited.

D.
ICMP hijacking attacks can still succeed through any firewall.

Next Question

Leave a Reply

Your email address will not be published. Required fields are marked *