The security department would like to apply specific restrictions to one network user, Bob,
because he works from home and accesses the corporate network from the outside interface of
the security appliance. decides to control network access for this user by using the downloadable
ACL feature of the security appliance. Authentication of inbound traffic is already configured on the
security appliance, and Bob already has a user account on the Cisco Secure ACS. Which three
tasks should be completed in order to achieve the goal of limiting network access for Bob via
downloadable ACLs? (Choose three.)
A.
Configure the security appliance to use downloadable ACLs.
B.
Attach the downloadable ACL to the user profile for Bob on the Cisco Secure ACS.
C.
Configure the Cisco Secure ACS to use downloadable ACLs.
D.
Configure the downloadable ACLs on the Cisco Secure ACS.