which of the following types of traffic will be allowed through a firewall with the Rule Base displayed in the exhibit?