An administrator wants to block HTTP uploads. Examine the exhibit, which contains the proxy address created for that purpose.
Where must the proxy address be used?
A. As the source in a firewall policy.
B. As the source in a proxy policy.
C. As the destination in a firewall policy.
D. As the destination in a proxy policy.