What two statements are true about the attack object database update process?
(Choose two.)
A.
Attack objects are downloaded from the Juniper web site over TCP port 443 and are stored on
Security Manager.
B.
Attack object database update can be scheduled using the commands guiSvrCli.sh and
cron.
C.
Attack object database update can be scheduled using the two commands idpSvrCli.sh and cron.
D.
The administrator is given the choice of which static groups to update.