Amy is configuring a User Authentication rule for the technical-support department to access an intranet server. What is the correct statement?
A.
The Security Server first checks if there is any rule that does not require authentication for this type of connection.
B.
The User Authentication rule must be placed above the Stealth Rule.
C.
Once a user is first authenticated, the user will not be prompted for authentication again until logging out.
D.
Amy can only use the rule for Telnet, FTP, and rlogin services.
E.
Amy can limit the authentication attempts in the Authentication tab of the User Properties screen.