Which two statements are true about Violation Objects? (Choose two.)
A.
Violation Objects are used even if Profiler is not enabled.
B.
A Violation Object is an accept only rulebase.
C.
Violation Objects can help you identify activity in your network that does not meet the Corporate
Security Policy.
D.
Any traffic that matches the Violation Object is flagged as a violation.