You recently implemented application firewall rules on an SRX device to act upon encrypted
traffic. However, the encrypted traffic is not being correctly identified. Which two actions will
help the SRX device correctly identify the encrypted traffic? (Choose two.)
A.
Use the junos:SPECIFIED-ENCRYPTED application signature.
B.
Use the junos:UNSPECIFIED-ENCRYPTED application signature.
C.
Disable the application system cache.
D.
Enable heuristics to detect the encrypted traffic.