Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam ECSAv10 Topic 8 Question 66 Discussion

Actual exam question for Eccouncil's ECSAv10 exam
Question #: 66
Topic #: 8
[All ECSAv10 Questions]

You are running through a series of tests on your network to check for any security vulnerabilities. After normal working hours, you initiate a DoS attack against your external firewall. The firewall quickly freezes up and becomes unusable.

You then initiate an FTP connection from an external IP into your internal network. The connection is successful even though you have FTP blocked at the external firewall. What has happened?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Meaghan
5 months ago
I agree with In a failed-open situation, the firewall allows all traffic through when it should be blocking it.
upvoted 0 times
...
Sean
6 months ago
I believe it's a failed-open scenario. The firewall let the FTP connection through despite the block.
upvoted 0 times
...
Alida
6 months ago
Do you think the firewall failed-open or failed-closed?
upvoted 0 times
...
Edmond
6 months ago
That's concerning. It shouldn't have allowed the FTP connection if it has FTP blocked.
upvoted 0 times
...
Alida
6 months ago
I can't believe the firewall froze up during the DoS attack.
upvoted 0 times
...
Kenny
6 months ago
I don't think so, if the FTP connection bypassed the firewall, it wouldn't be successful.
upvoted 0 times
...
Marisha
6 months ago
But could it also be the firewall failed-bypass?
upvoted 0 times
...
Avery
6 months ago
I agree, the firewall must have failed-open for the FTP connection to be successful.
upvoted 0 times
...
Nettie
7 months ago
I think the firewall failed-open.
upvoted 0 times
Merlyn
6 months ago
So, even though FTP is blocked, it still allowed the connection because of the failed-open state.
upvoted 0 times
...
Nan
6 months ago
That's right. In a failed-open state, the firewall allows all traffic to pass through.
upvoted 0 times
...
Trina
7 months ago
It looks like the firewall failed-open.
upvoted 0 times
...
...
Tarra
8 months ago
I'm starting to get a little nervous about this exam. I mean, who knows what kind of crazy scenarios they're going to throw at us? But this one, with the DoS attack and the FTP connection, that's just wild. I'm thinking the answer is C - the firewall failed-closed.
upvoted 0 times
...
Fidelia
8 months ago
This question is like a punch in the gut. Who in their right mind would run a DoS attack on their own network? That's just begging for trouble. But hey, at least it's not on the exam, right? As for the answer, I'm leaning towards B - the firewall failed-bypass.
upvoted 0 times
...
Tambra
8 months ago
Okay, so we've got a firewall that's freezing up and an FTP connection that's working when it shouldn't be. Sounds like a real mess. I'm thinking the answer is D - the firewall ACL has been purged. That would explain why the FTP connection was able to get through.
upvoted 0 times
...
Luann
8 months ago
Dude, this question is giving me a headache. I mean, who even does that kind of testing on a live network? That's just asking for trouble. But if I had to pick an answer, I'd say C - the firewall failed-closed. That would make the most sense to me.
upvoted 0 times
...
Gladys
8 months ago
Hold up, a DoS attack on the firewall? That's some serious stuff. I'm thinking the firewall failed-open (A), which would explain why the FTP connection went through even though it's supposed to be blocked.
upvoted 0 times
...
Shantell
8 months ago
Whoa, this question is intense! A DoS attack on the firewall that makes it freeze up? That's no good. As for the FTP connection, I'm gonna go with B - the firewall failed-bypass. That's the only one that makes sense to me.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77