The network security administrator for XYZ Corporation creates an FTP inspection policy that includes the strict option and applies it to the outside interface of the corporate adaptive security appliancD. After this policy is applied, in what three ways is FTP handled on the security appliance? (Choose three )
A.
FTP inspection is applied to traffic entering the inside interface.
B.
Strict FTP inspection is applied to traffic entering the inside interface.
C.
FTP inspection is applied to traffic exiting the inside interface.
D.
Strict FTP inspection is applied to traffic exiting the outside interface.
E.
FTP inspection is applied to traffic exiting the dmz interface.
F.
Strict FTP inspection is applied to traffic entering the outside interface.