Given the configuration shown in the exhibit, which configuration object would be used to associate both Nancy and Walter with firewall user authentication within a security policy?
A.
ftp-group
B.
ftp-users
C.
firewall-user
D.
nancy and walter
Click the Exhibit button.
Given the configuration shown in the exhibit, which configuration object would be used to associate both Nancy and Walter with firewall user authentication within a security policy?
Given the configuration shown in the exhibit, which configuration object would be used to associate both Nancy and Walter with firewall user authentication within a security policy?
A.
ftp-group
B.
ftp-users
C.
firewall-user
D.
nancy and walter