What is the order of the defensive layers a cracker would have to compromise when attacking a properly secured network?

A.
Firewall
B.
Router
C.
Application
D.
Host
E.
IDS
F.
B, E, A, D, C
G.
B, A, E, D, C
H.
A, B, C, D, E
I.
A, B, E, D, C
J.
A, E, B, D, C
I agree with the answer. B