What weaknesses exist in this implementation?
a. Lack of intrusion detection and prevention system
b. Limited scalability for future growth
c. Single point of failure with the UTM device
d. Potential performance bottlenecks on the UTM device
e. Limited visibility and control over network traffic.