When configuring a Decryption Policy Rule, which of the following are available as matching criteria in the rule? (Choose 3 answers.)
A. Source Zone
B. URL Category
C. Application
D. Service
E. Source User
When configuring a Decryption Policy Rule, which of the following are available as matching criteria in the rule? (Choose 3 answers.)
A. Source Zone
B. URL Category
C. Application
D. Service
E. Source User