Which of the following is a way to get around a firewall to intrude into a secure network from a rem seenagape 11 years ago Which of the following is a way to get around a firewall to intrude into a secure network from aremote location? A.Modem banks B.Identified network topology C.Active ports D.Active IP services ← Previous question Next question →