If inadequate, which of the following would be the MOST likely contributor to a denial-of-service attack?

A.
Router configuration and rules
B.
Design of the internal network
C.
Updates to the router system software
D.
Audit testing and review techniques
Explanation:
Inadequate router configuration and rules would lead to an exposure to denial-of-service attacks. Choices B and C would be lesser contributors. Choice D is incorrect because audit testing and review techniques are applied after the fact.