Which of the following is the BEST method for determining whether a firewall has been configured to provide a comprehensive perimeter defense? A. A port scan of the firewall from an internal source B. A simulated denial of service (DoS) attack against the firewall C. A validation of the current firewall rule set D. A ping test from an external source  Suggested Answer: C This question is in CISM exam For getting Certified Information Security Manager Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by ISACA. The website does not contain actual questions and answers from ISACA's Certification Exams. Trademarks, certification & product names are used for reference only and belong to ISACA.
Please login or Register to submit your answer