Given the configuration shown in the exhibit, which configuration object would be used to
associate both Nancy and Walter with firewall user authentication within a security policy?
A.
ftp-group
B.
ftp-users
C.
firewall-user
D.
nancy and walter
Given the configuration shown in the exhibit, which configuration object would be used to
associate both Nancy and Walter with firewall user authentication within a security policy?
A.
ftp-group
B.
ftp-users
C.
firewall-user
D.
nancy and walter