Jennifer wants to protect internal users from malicious Java code, but she does not want to strip Java scripts. Which is the BEST configuration option?
A.
Use the URI resource to block Java code
B.
Use CVP in the URI resource to block Java code
C.
Use the URI resource to strip ActiveX tags
D.
Use the URI resource to strip applet tags
E.
Use the URI resource to strip script tags