Question

If an attacker takes over a firewall, he or she will be able to ________.
A) allow connection-opening requests that violate policy
B) reroute internal data to alternate paths
C) provide the false sense that the firewall is still working correctly
D) All of the above

Answer

This answer is hidden. It contains 1 characters.