A company requires the firewall to block expired certificates issued by internet-hosted websites. The company plans to implement decryption in the future, but it does not perform SSL Forward Proxy decryption at this time. Without the use of SSL Forward Proxy decryption, how is the firewall still able to identify and block expired certificates issued by internet-hosted websites?
A. y using SSL Forward Proxy to decrypt SSL and TLS handshake communication and the server/client session keys in order to validate a certificate's authenticity and expiration
B. y having a Certificate profile that contains the website's Root CA assigned to the respective Security policy rule
C. y using SSL Forward Proxy to decrypt SSL and TLS handshake communication in order to validate a certificate's authenticity and expiration
D. y having a Decryption profile that blocks sessions with expired certificates in the No Decryption section and assigning it to a No Decrypt policy rule