Correct Answer : Address, Protocols and Packet attributes
Explanation : Network administrators can create their own ACL rules based on Address, Protocols and Packet attributes. This is generally done where the specific customised type of data packets need to pass through firewall screening.