Which of the following weaknesses would have the GREATEST impact on the effective operation of a perimeter firewall?
A. Ad-hoc monitoring of firewall activity
B. Potential back doors to the firewall software
C. Misconfiguration on the firewall rules
D. Use of stateful firewalls with default configuration
A. Ad-hoc monitoring of firewall activity
B. Potential back doors to the firewall software
C. Misconfiguration on the firewall rules
D. Use of stateful firewalls with default configuration