Which two statements are true regarding the firewall enforcement process? (Choose two.)
A.
The enforcer always sends a query to the MAG Series device to determine whether the
endpoint is already authenticated.
B.
The enforcer always searches its local auth table for a match for the user’s IP address.
C.
Using the default policy, all users are mapped to all enforcers.
D.
The enforcer allows access to the resource until it determines the status of the endpoint
authentication.
Explanation: