In the Enterprise Security Profiler, what would you define under Permitted Objects?
A.
Define traffic that violates your security policy.
B.
Define valid, permitted activity on the network.
C.
Define any attacks that violate your security policy.
D.
Define violations of permitted activity on the network.