Which of the following would need to be created to configure an application-layer inspection of SMTP traffic operating on port 2525?
Which threat-detection feature is used to keep track of suspected attackers who create connections to too many hosts or ports?