If inadequate, which of the following would be the MOST likely contributor to a denial-of-service attack?
Which of the following implementation modes would provide the GREATEST amount of security for outbound data connecting to the internet?