If security policy is enforced by more than two firewalled objects, how many rule bases would you need?
A.
Three rule bases
B.
Only one rule base
C.
No rule base is needed to implement your security policy
D.
Two rule bases
E.
One rule base each for each number of network objects there