A.zones on which an attack might arrive B.zones you want to protect from attack C.interfaces on which an attack might arrive D.interfaces you want to protect from attack
A.DoS B.SYN flood C.port scanning D.IP address sweep
A.DoS B.exploit C.propagation D.port scanning E.reconnaissance