Jon is explaining how the inspection module works to a colleague. If a new connection
passes through the inspection module and the packet matches the rule, what is the next
step in the process?
A.
Verify if the packet should be rejected.
B.
Verify if the packet should be moved through the TCP/IP stack.
C.
Verify if another rule exists.
D.
Verify if any logging or alerts are defined.
Explanation: