The P4S security department would like to apply specific restrictions to one network user, Bob,
because he works from home and accesses the corporate network from the outside interface of
the security appliance. P4S decides to control network access for this user by using the
downloadable ACL feature of the security appliance. Authentication of inbound traffic is already
configured on the security appliance, and Bob already has a user account on the Cisco Secure
ACS. Which three tasks should be completed in order to achieve the goal of limiting network
access for Bob via downloadable ACLs? (Choose three.)
A.
Configure the security appliance to use downloadable ACLs.
B.
Configure the downloadable ACLs on the Cisco Secure ACS.
C.
Attach the downloadable ACL to the user profile for Bob on the Cisco Secure ACS.
D.
Configure the Cisco Secure ACS to use downloadable ACLs.