Which statement below describes the most correct strategy for implementing a Rule Base?
A.
Add the Stealth Rule before the last rule.
B.
Umit grouping to rules regarding specific access.
C.
Place the most frequently used rules at the top of the Policy and the ones that are not frequently used further down.
D.
Place a network-traffic rule above the administrator access rule.