A.Stateful firewall B.Proxy firewall C.Packet filtering firewall D.Stateless firewall
A.It is restricted in size to only three segments B.It requires the use of netBT as the network protocol C.It requires the implementation of IKE D.It relies on an underlying Public Key Infrastructure
A.Segment security zones B.Restrict access to firewalls C.Use logs and alerts D.Set connection limits