what will be modified by the ScreenOS device when traffic travels from the trust zone to the untrust zone?
Which sequence of steps must be performed to make the interface operational at the end of the configuration sequence?