Q: 6
Which functionality does an NGFW use to determine whether new session setups are legitimate or
illegitimate?
Options
Discussion
Option B. SYN cookies. They're what NGFWs use to make sure a TCP handshake is legit before session setup. This came up in the official guide if I remember right. Somebody correct me if you think it's a trick question.
I don’t think D is right here. B is the one that actually verifies if the handshake’s legit using SYN cookies, while D is just the broader protection against floods. I’ve seen a similar question and B was the expected answer. Disagree?
B
Pretty confident it's B here. SYN cookies actually handle the verification of a real handshake, which is exactly what they're asking.
This is about the actual handshake check, not just protection: so it's B. SYN cookies let the NGFW validate if the client really got the SYN-ACK, proving legitimacy before a new session spins up. D (SYN flood protection) is broader but doesn't describe how legitimacy is determined. I think B's correct but correct me if I'm missing a catch here.
I get why people might pick D since it's related to attacks, but the actual session legitimacy check is with SYN cookies (B). Pretty sure B is the right call here. Trap is mixing up prevention and verification.
Probably B. SYN cookies help the NGFW verify if the handshake is genuine before allocating resources, especially against spoofed SYNs. Seen this in some practice material. Open to pushback if anyone's seen different.
B tbh, SYN cookies are used to check if that TCP handshake is real before setting up resources. Seen similar on practice tests, question's clear and straight to the point.
Be respectful. No spam.