If inadequate, which of the following would be the MOST likely contributor to a denial-of- service
Router configuration and rules
Design of the internal network
Updates to the router system software
Audit testing and review techniques
Inadequate router configuration and rules would lead to an exposure to denial-of-service attacks.
Choices B and C would be lesser contributors. Choice D is incorrect because audit testing and
review techniques are applied after the fact.