A. Forbids communications from untrustworthy sources
B. Allows communications from trustworthy sources
C. Eliminates viruses and other malicious attacks
D. Filters traffic based on packet attributes.
A. Forbids communications from untrustworthy sources
B. Allows communications from trustworthy sources
C. Eliminates viruses and other malicious attacks
D. Filters traffic based on packet attributes.