Wayne configures an HTTP Security Server to work with the content vectoring protocol to screen
forbidden sites. He has created a URI resource object using CVP with the following settings:
Use CVP
Allow CVP server to modify content
Return data after content is approved
He adds two rules to his Rule Base: one to inspect HTTP traffic going to known forbidden sites,
the other to allow all other HTTP traffic.
Wayne sees HTTP traffic going to those problematic sites is not prohibited.
What could cause this behavior?
A.
The Security Server Rule is after the general HTTP Accept Rule.
B.
The Security Server is not communicating with the CVP server.
C.
The Security Server is not configured correctly.
D.
The Security Server is communicating with the CVP server, but no restriction is defined in the
CVP server.