Assume that Enterprise Security Profiler (ESP) has already captured data for your network. You want
to view traffic that does not match the following protocols: HTTP,
HTTPS, DNS. Which steps must you perform?
A.
Under the Violation Viewer tab, create a permitted object, select that object, and then click Apply.
B.
Under the Violation Viewer tab, create a filter to show only tracked hosts.
C.
Under the Violation Viewer tab, create a violation object, select that object, and then click Apply.
D.
Under the Application View tab, create a permitted object, select that object, and then click
Apply.