Which of the following methods of protection is not available within the Protocol Security Manager for HTTP traffic?
A. Data guard
B. Attack signatures
C. Evasion techniques
D. File type enforcement
Which of the following methods of protection is not available within the Protocol Security Manager for HTTP traffic?
A. Data guard
B. Attack signatures
C. Evasion techniques
D. File type enforcement