Scenario: An administrator plans to troubleshoot connections to the SSL virtual server configured on
the NetScaler by using the WireShark tool. The administrator created a network trace file.
What will the administrator need to decrypt the network trace?

A.
NS-root key
B.
NS-server key
C.
Private key of the root certification authority
D.
Private key of the certificate that is bound to the virtual server