Refer to the exhibit. Which statement correctly describes this security architecture, which is used
to protect the multi-tiered web application?
A.
This architecture supports application tiers that are dual homed.
B.
All the servers are protected by the dual-tier firewall systems and do not require additional
endpoint security controls.
C.
The firewall systems in the first and second tiers should be implemented with identical security
controls to provide defense in depth.
D.
The second-tier Cisco ASA AIP-SSM should be tuned for inspecting Oracle attack signatures.