Refer to the exhibit. The security policy for XYZ Corporation allows only the following traffic through the corporate adaptive security appliance:
–outbound NTP traffic from the inside network to any outside destination
–FTP traffic from the inside network to the FTP server on the DMZ
–outbound HTTP traffic from the inside network to any outside destination
–FTP traffic from the outside 192.168.6.0/24 network to the FTP server on the DMZ
–any HTTP traffic from the outside to the web server on the DMZ
The network administrator configured access rules to meet the requirements of the security policy but made two mistakes. Which two mistakes did the administrator make? (Choose two.)
A.
incorrect source address
B.
incorrect destination address
C.
two ACLs applied to a single interface
D.
incorrect order of ACLs
E.
missing ACL
F.
missing ACE