Which feature is used to inspect encrypted web traffic for malware?
A.
HTTPS inspection
B.
proxy authentication
C.
credential encryption
D.
access policies
Which feature is used to inspect encrypted web traffic for malware?
Which feature is used to inspect encrypted web traffic for malware?
A.
HTTPS inspection
B.
proxy authentication
C.
credential encryption
D.
access policies