Which of the following are authentication methods that Security Gateway R76 uses to validate connection attempts?
With the User Directory Software Blade, you can create R76 user definitions on a(n) _________ Server.