What should an administrator utilize in policies to specify which traffic should be decrypted? (Choose the best answer.)
A. Listeners
B. URL categories
C. The SSL Proxy
D. All proxy services
What should an administrator utilize in policies to specify which traffic should be decrypted? (Choose the best answer.)
A. Listeners
B. URL categories
C. The SSL Proxy
D. All proxy services