Which of the following are authentication methods that Security Gateway R75 uses to validate connection attempts? Select the response below that includes the MOST complete list of valid authentication methods.
A.
Proxied, User, Dynamic, Session
B.
Connection, User, Client
C.
User, Client, Session
D.
Connection, Proxied, Session