When you add a resource object to a rule, which of the following occurs?
A.
All packets that match the resource will be dropped.
B.
All packets matching that rule are either encrypted or decrypted by the defined resource.
C.
All packets matching the resource service are analyzed through an application-layer proxy.
D.
Users attempting to connect to the destination of the rule will be required to authenticate.