Which of the following weaknesses would have the GREATEST impact on the effective operation of a perimeter firewall?
Use of stateful firewalls with default configuration
Ad hoc monitoring of firewall activity
Misconfiguration of the firewall rules
Potential back doors to the firewall software
Submit