You want to use the Intrusion Prevention System features of a vSRX virtual firewall to protect systems from attacks embedded in traffic.
In this scenario, which three technologies would be used? (Choose three.)
A . protocol decodes
B . zero-day protection
C . traffic normalization
D . application firewall
E . application tracking
Answer: ABC