Jon is explaining how the inspection module works to a colleague. If a new connection passes
through the inspection module and the packet matches the rule, what is the next step in the
process?
A.
Verify if the packet should be moved through the TCP/IP stack.
B.
Verify if any logging or alerts are defined.
C.
Verify if the packet should be rejected.
D.
Verify if another rule exists.
Explanation: