Following a recent security audit, you find that users are able to ping between the untrust zone
and the trust zone, which is contrary to your organization’s current security policy. On examination
of the current security policies, you find no policies that would allow these connections.
What are two reasons why users would be able to ping between these zones? (Choose two.)
A.
The default policy has been modified to permit all traffic.
B.
There is a hidden policy that permits all traffic from untrust to trust.
C.
A firewall filter has been configured that places traffic into packet mode.
D.
ICMP traffic is not subject to policy inspection.