What should an administrator utilize in policies to specify which traffic should be decrypted? (Choose the best answer.)
Which two (2) methods are recommended to solve Schannel congestion? (Choose two.)
How does an administrator view policy coverage statistics? (Choose the best answer.)
How do policy checkpoints evaluate the installed policy on a ProxySG? (Choose the best answer.)