The security department of the P4S company wants to configure cut-through proxy authentication
via RADIUS to require users to authenticate before accessing the corporate DMZ servers. Which
three tasks are needed to achieve this goal? (Choose three.)
A.
Configure a rule that specifies which traffic flow to authenticate.
B.
Designate an authentication server.
C.
Specifya AAA server group.
D.
Configure per-user override.