How is unauthorized access mitigated in the SAFE SMR midsize network design corporate
Internet module?
A.
CAR at the ISP edge and TCP setup controls at the firewall
B.
IDS at the host and network levels
C.
OS and IDS detection
D.
RFC 2827 and 1918 filtering at ISP edge and midsize network edge router
E.
e-mail content filtering, HIDS, and host-based virus scanning
F.
filtering at the ISP, edge router, and corporate firewall