I'm not sure about SSH Inbound Inspection. I think SSL Outbound Proxy, SSL Forward Proxy, and SSL Inbound Inspection are the three decryption methods available in a security processing node.
D, SSL Inbound Inspection, seems like the obvious choice here. The question is asking about decryption methods in a security processing node, and this option fits the bill.
I agree with Willard. SSL Outbound Proxy, SSL Forward Proxy, and SSH Inbound Inspection are the three decryption methods available in a security processing node.
Delmy
2 days agoDottie
4 days agoMarjory
6 days agoWillard
8 days ago