To which two policy types can an administrator apply a web reputation profile to implement
reputation-based processing? (Choose two.)
A.
access policies that permit traffic
B.
access policies that deny traffic
C.
decryption policies that decrypt potentially malicious traffic
D.
universal access policies
E.
NAT policies for ASAs that operate in multiple device mode
F.
packet capture policies that perform global capture of dropped packets