You want Enterprise Security Profiler (ESP) to capture layer 7 data of packets traversing the network.
Which two steps must you perform? (Choose two.)
A.
Configure ESP to enable application profiling, and select the contexts to profile.
B.
Under the Violation Viewer tab, create a permitted object, select that object, and then click Apply.
C.
Start or restart the profiler process.
D.
Create a filter in the ESP to show only tracked hosts.