An administrator creates an SSL decryption rule decrypting traffic on all ports. The administrator also creates a Security policy rule allowing only the applications DNS, SSL, and web-browsing. The administrator generates three encrypted BitTorrent connections and checks the Traffic logs. There are three entries. The first entry shows traffic dropped as application Unknown. The next two entries show traffic allowed as application SSL. Which action will stop the second and subsequent encrypted BitTorrent con
A. Create a decryption rule matching the encrypted BitTorrent traffic with action “No-Decrypt,” and place the rule at the top of the Decryption policy
B. Create a Security policy rule that matches application “encrypted BitTorrent” and place the rule at the top of the Security policy
C. Disable the exclude cache option for the firewall
D. Create a Decryption Profile to block traffic using unsupported cyphers, and attach the profile to the decryption rule