Which feature is used to inspect encrypted web traffic for malware?

Which feature is used to inspect encrypted web traffic for malware?

Which feature is used to inspect encrypted web traffic for malware?

A.
HTTPS inspection

B.
proxy authentication

C.
credential encryption

D.
access policies



Leave a Reply 0

Your email address will not be published. Required fields are marked *