We can also implement ____________ in Stateful Multilayer Inspection firewall.
(a) external programs
(b) algorithms
(c) policies
(d) algorithms and external programs
I had been asked this question in an interview.
This interesting question is from Firewalls in portion Cyber Security of Cyber Security