Fill in the blank: To build an effective Security Policy, use a ________ and _______ rule.
A.
Cleanup; stealth
B.
Stealth; implicit
C.
Cleanup; default
D.
Implicit; explicit
Fill in the blank: To build an effective Security Policy, use a ________ and _______ rule.
Fill in the blank: To build an effective Security Policy, use a ________ and _______ rule.
A.
Cleanup; stealth
B.
Stealth; implicit
C.
Cleanup; default
D.
Implicit; explicit