A.Pass B.Flow C.Allow D.Inspect
A.Starting a Smurf attack B.Conducting social engineering C.Creating a back door D.Launching a DoS attack
A.Authorization B.Confidentiality C.Authentication D.Integrity