If inadequate, which of the following would be the MOST likely contributor to a denial-of-service attack? 
A、Router configuration and rules 
B、Design of the internal network 
C、Updates to the router system software 
D、Audit testing and review techniques 
							
