Network administrators can create their own ACL rules based on _______ ________ and _______
(a) Address, Protocols and Packet attributes
(b) Address, Protocols and security policies
(c) Address, policies and Packet attributes
(d) Network topology, Protocols and data packets
I had been asked this question in a national level competition.
The origin of the question is Firewalls topic in chapter Cyber Security of Cyber Security