The question above has multiple choices as follows
a) SSH
b) Non-SSL
c) SSL Inbound Inspection
d) SSL Outbound
The answer is C and D
To enable the firewall act as a proxy for these two types of traffic, it has to perform an SSL forward proxy decryption. The Network admin has to set up certificates needed to establish the firewall as a trusted 3rd party to the session that exists between client and server.
The firewall can use self-signed certificates to authenticate SSL session with the client.