Which option describes the benefits of a secure BYOD architecture using SGT?
A.
complex network design and lower operational costs
B.
eliminates ACL explosion and offloads filtering to ASA for rich and scalable policy rule
automation
C.
complex network design and topology dependent segmentation using Security Group
D.
Segmentation using Security Group is topology dependent and offloads filtering to ASA for rich
and scalable policy rule automation.