Click the Exhibit button.
You have configured an IDP policy as shown in the exhibit. The configuration commits successfully. Which
traffic will be examined for attacks?
A.
only originating traffic from source to destination in a session
B.
only reply traffic from destination to source in a session
C.
both originating and reply traffic between hosts in a session
D.
recommended traffic between the source and destination hosts
Explanation:
http://www.juniper.net/techpubs/software/junos-security/junos-security96/junos-security- swconfigsecurity/config-idp-ips-rulebase-section.html#config-idp-ips-rulebase-section