Click the Exhibit button. You configured a custom signature attack object to match specific
components of an attack: Which client traffic would be identified as an attack?
A.
HTTP POST .*x909090 … 90
B.
HTTP GET .*x909090 … 90
C.
HTTP POST .*\x90 90 90 … 90
D.
HTTP GET .*\x90 90 90 … 90