Which three statements about protocol inspection on the Cisco ASA adaptive security appliance are true?