In the network shown in the exhibit, you have been asked to enable users in the Untrust zone to
contact Server1 on TCP port 80 using IP address 1.1.1.1. You also need to allow Server1 to make
connections to hosts in the Untrust zone. When Server1 makes connections to the Untrust zone,
the source address of its traffic should be translated to 1.1.1.1.
What would you use to configure this behavior?
A.
MIP
B.
VIP
C.
DIP
D.
SIBR