180k views
4 votes
On that same incident response event her team learns that there was an access to the firewall configurations of the primary boundary firewall. The first four rules from the firewall are shown below.

a. If the culprit modified the firewall rules, which one is the most likely candidate? Why?
b. Describe what each of these firewall rules is doing.

Priority Source Destination Protocol/Service Direction Action Logging
1 Any Any Any In/Out Allow None
2 External Firewall Any In Deny Yes
3 192.168.1.1 Firewall SSH Out Allow None
4 Internal Firewall SSH Out Deny Yes

1 Answer

6 votes

Final answer:

The most likely candidate for modification is Rule 2, which denies incoming traffic from the External Firewall and plays a crucial role in protecting the network from external threats.

Step-by-step explanation:

The culprit most likely modified Rule 2, which is the firewall rule that denies incoming traffic from the External Firewall. This is the most likely candidate because modifying this rule would allow unauthorized access to the network from the external firewall. Rule 2 plays a crucial role in protecting the network from external threats.

Rule 1 is a general rule that allows all traffic in both directions, Rule 3 allows SSH traffic from the firewall to 192.168.1.1, and Rule 4 denies outgoing SSH traffic from the internal firewall. These rules are less likely to be modified by the culprit because they do not grant direct access to the network from an external source like Rule 2 does.

User Tejesh Palagiri
by
8.1k points