A. It has its own policy table. B. It is configured as part of Access Policies. C. It is configured as part ofIronPort data Security. D. It only has global configuration.
A. deployment option B. acceptable use policies C. S-Series interface settings D. authentication infrastructure
A. the L4TM allow list overrides the block list B. the overlap of the L4TM allow list and block list is the L4TM grey list C. the L4TM block lists override the allow lists D. L4TM allow list and block list overlaps are not permitted