Which three statements correctly describe protocol inspection on the Cisco ASA adaptive security
appliance? (Choose three.)
A.
For the security appliance to inspect packets for signs of malicious application misuse, you
must enable advanced (application layer) protocol inspection.
B.
if you want to enable inspection globally for a protocol that is not inspected by default or if you
want to globally disable inspection for a protocol, you can edit the default global policy.
C.
The protocol inspection feature of the security appliance securely opens and closes negotiated
ports and IP addresses for legitimate client-server connections through the security appliance.
D.
if inspection for a protocol is not enabled, traffic for that protocol may be blocked.