Study the exhibit carefully. Apply the HTTP inspection map named HTTP_POLICY to the
partnernet interface of the security appliance. Which step will be taken by the security appliance
as a result of its configuration for HTTP traffic that enters its partnernet interface?
A.
drops HTTP request messages for which the request method is put, and logs HTTP request
messages for which the request header host field contains either the string example1.com or the
string example2.com
B.
logs HTTP request messages for which the request method is put, and drops HTTP request
messages for which the request header host field contains either the string example1.com or the
string example2.com
C.
drops and logs HTTP request messages for which the request method is put or the request
header host field contains the strings example1.com and example2.com
D.
drops and logs HTTP request messages for which the request method is put and the request
header host field contains either the string example1.com or the string example2.com