An information security manager reviewing firewall rules will be MOST concerned if the firewall allows:
A. source routing.
B. broadcast propagation.
C. unregistered ports.
D. nonstandard protocols.
A. source routing.
B. broadcast propagation.
C. unregistered ports.
D. nonstandard protocols.