Choose two features of the PIX Firewall. Choose two.
A.
uses Cisco Finesse operating system
B.
uses a cut-through proxy to provide user-based authentication connections
C.
analyzes every packet at the application layer of the OSI model
D.
based on Windows NT technology
E.
can be configured to provide full routing functionality
F.
uses Cisco IOS operating system