//IMG//
Given the network diagram, traffic should be permitted for both Trusted and Guest users to access general Internet and DMZ servers using SSH, web-browsing and SSL applications.
Which policy achieves the desired results?
A.
//IMG//
B.
//IMG//
C.
//IMG//
D.
//IMG//
Correct region(s)
—