The first step in effectively implementing a firewall is:
A.
blocking unwanted outgoing traffic
B.
blocking unwanted incoming traffic
C.
developing a firewall policy
D.
protecting againstDDoS attacks
Explanation:
What good is a firewall without any kind of policy or configuration policy to be implemented?