You recently implemented application firewall rules on an SRX device to act upon encrypted
traffic. However, the encrypted traffic is not being correctly identified.
Which two actions will help the SRX device correctly identify the encrypted traffic? (Choose two.)
Enable heuristics to detect the encrypted traffic.
Disable the application system cache.
Use the junos:UNSPECIFIED-ENCRYPTED application signature.
Use the junos:SPECIFIED-ENCRYPTED application signature.