You are the network security administrator for the P4S company. You create an FTP inspection
policy including the strict option, and it is applied to the outside interface of the corporate adaptive
security appliance. How to handle FTP on the security appliance after this policy is applied?
(Choose three.)
A.
FTP inspection is applied to traffic entering the inside interface.
B.
Strict FTP inspection is applied to traffic entering the outside interface.
C.
FTP inspection is applied to traffic exiting the inside interface.
D.
Strict FTP inspection is applied to traffic exiting the outside interface.