Firewalk tool employs a technique to determine the ___________ rules in place on the ___________ forwarding device.
(a) filter, packet
(b) filter, port
(c) routing, packet
(d) routing, port
This question was addressed to me at a job interview.
Query is from Scanning Phase for Security in section Phases of Security of Cyber Security