To build an effective Security Policy, use a ________ and _______ rule.
A . Cleanup; stealth
B . Stealth; implicit
C . Cleanup; default
D . Implicit; explicit
Answer: A
To build an effective Security Policy, use a ________ and _______ rule.
A . Cleanup; stealth
B . Stealth; implicit
C . Cleanup; default
D . Implicit; explicit
Answer: A