What is true of standard access control lists when applied to an interface to control inbound or outbound traffic?
A.
The best match of the ACL entries will be used for granularity of control.
B.
They use source IP information for matching operations.
C.
They use source and destination IP information for matching operations.
D.
They use source IP information along with protocol-type information for finer granularity of control.