A network engineer sends the firewall administrator the following packet capture of a suspicious packet received by the company main web server:
configured on the border firewall:
Which of the following statements BEST describes scenario?
A.
The suspicious packet was sent to the web server by an internal host.
B.
The packet is legitimate traffic and was blocked by the web service.
C.
The suspicious packet made it through the firewall due to an ACL misconfiguration.
D.
The web server has been compromised and is responding with malformed packets.