A network technician is configuring a new firewall for a company with the necessary access requirements to be
allowed through the firewall. Which of the following would normally be applied as the LAST rule in the firewall?
A. Secure SNMP
B. Port security
C. Implicit deny
D. DHCP snooping
allowed through the firewall. Which of the following would normally be applied as the LAST rule in the firewall?
A. Secure SNMP
B. Port security
C. Implicit deny
D. DHCP snooping