A company technician has set up the network so that all external protections and internal protections across the network are segregated from any malicious attacks and there are firewalls configured on both sides of the DMZ. During the configuration review of the
device installation, there is evidence of unauthorized network traffic penetrating the internal network.
Which of the following is either missing or incorrectly configured in the firewall settings?
A. Stateful settings
D. Implicit deny
E. Stateless settings