Which statements about intrusion detection in the PIX Firewall are true? Choose two.
A.
IP audit policies must be applied to an interface with theip audit signature command.
B.
When a policy for a given signature class is created and applied to an interface, all supported
signatures of that class are monitored and cannot be disabled until you remove the policy from the
interface.
C.
When a policy for a given signature class is created and applied to an interface, all supported
signatures of that class are monitored unless you disable them.
D.
IP audit policies must be applied to an interface with theip audit interface command.
E.
The PIX Firewall supports only inbound auditing.
F.
Only the signatures you enable will be monitored.