Routers and firewalls use _______ to determine which packets should be forwarded or dropped.
Encryption
Security audit log
Access control list
Ciphering
Submit