Which of the following are considered best practices for deřning firewall rules? (Choose all that apply)
O All traffic from the trusted network is allowed out.
O The firewall device is sometimes directly accessible from the public network for configuration or management purposes
O SMTP data is allowed to enter, but it is routed through a ICMP gateway.
O All ICMP data should be denied.
O Telnet access should be blocked to all internal servers from public networks.
O HTTP traffic should be allowed when web services are offered outside the firewall.
O All data that is not verifiably authentic should be denied.