When configuring a Decryption Policy Rule, which of the following are available as matching criteria in the rule? (Choose three.)
A. Source Zone
B. URL Category
C. Application
D. Service
E. Source User
When configuring a Decryption Policy Rule, which of the following are available as matching criteria in the rule? (Choose three.)
A. Source Zone
B. URL Category
C. Application
D. Service
E. Source User