You are the network security administrator for the company. You create an FTP inspection policy
including the strict option, and it is applied to the outside interface of the corporate adaptive
security appliance. How to handle FTP on the security appliance after this policy is applied?
(Choose three.;)
A.
FTP inspection is applied to traffic entering the inside interface.
B.
FTP inspection is applied to traffic exiting the inside interface.
C.
strict FTP inspection is applied to traffic exiting the outside interface.
D.
strict FTP inspection is applied to traffic entering the outside interface.