Refer to the exhibit. The only traffic that the Company XYZ network administrator wants to allow through the corporate Cisco ASA adaptive security appliance is inbound HTTP to the DMZ network and all traffic from the inside network to the outside network. The administrator has configured the Cisco ASA adaptive security appliance, and access through it is now working as desired with one exception: contractors working on the DMZ servers have been surfing the Internet from the DMZ servers, which (unlike other Company XYZ hosts) are using public, routable IP addresses. Neither NAT statements nor access lists have been configured for the DMZ interface Why are the contractors able to surf the Internet from the DMZ servers?
(Note: The 192.168.X.X IP addresses are used to represent routable public IP addresses even though the 192.168.1.0 network is not actually a public routable network.)
A.
An access list on the outside interface permits this traffiC.
B.
NAT control is not enableE.
C.
The DMZ servers are using the same global pool of addresses that is being used by the inside hosts.
D.
Public, routable IP addresses are allowed to traverse the Cisco ASA adaptive security appliance from a higher security level interface to a lower security level interface regardless of the configuration.
E.
HTTP inspection is not enabled