The security department of the company wants to configure cut-through proxy authentication via
RADIUS to require users to authenticate before accessing the corporate DMZ servers. Which
three tasks are needed to achieve this goal? (Choose three.)
A.
specify a AAA server group.
B.
Designate an authentication server.
C.
Configure per-user override.
D.
Configure a rule that specifies which traffic flow to authenticate.