You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()
A. then reject
B. then discard
C. then next filter
D. then silent-drop