Which of the following statements is correct based on the firewall configuration illustrated in
the exhibit?

A.
A user must authenticate using the HTTP, HTTPS, SSH, FTP, or Telnet protocol before
they can access any services.
B.
A user cannot access the Internet using any protocols unless the user has passed
firewall authentication.
C.
A user can access the Internet using only the protocols that are supported by user
authentication.
D.
A user can access the Internet using any protocol except HTTP, HTTPS, Telnet, and
FTP. These require authentication before the user will be allowed access.