You configured a custom signature attack object to match specific components of an attack:HTTP-request
Pattern .*\\x90 90 90 … 90
Direction: client-to-server
Which client traffic would be identified as an attack?
A.
HTTP GET .*\\x90 90 90 … 90
B.
HTTP POST .*\\x90 90 90 … 90
C.
HTTP GET .*x909090 … 90
D.
HTTP POST .*x909090 … 90
Explanation:
http://www.juniper.net/techpubs/en_US//idp/topics/task/configuration/intrusion- detectionprevention-signature-attack-object-creating-nsm.html