John and Kathy are working on configuring the [OS firewall together. They are figuring out what
CBAC uses for inspection rules to configure on a per-application protocol basis. Which one of
these is the correct one?
A.
ODBC filtering
B.
Tunnel, transport models, or both
C.
Alerts and audit trails
D.
Stateful failover