Option A is what I'd pick. After setting up SPAN and the passive interface, you have to apply an intrusion policy so the FTD inspects the mirrored traffic. That's how it works on real gear and matches what I've seen in similar exam questions. Agree?
Option A fits what I've seen in Cisco official guides and lab exercises. Once SPAN and the passive interface are set, configuring the intrusion policy is the step that actually tells FTD to inspect the mirrored traffic. Pretty sure that's the sequence, but if anyone has seen otherwise in recent labs let me know.
I think it needs to be A. Since the passive-interface and SPAN are already done, the FTD is getting a copy of the traffic. But unless you set up an intrusion policy, nothing gets inspected for threats. Not 100% but matches what I've seen in labs. Anyone disagree?