CheckPoint Exam Questions

Which of the following objects is a valid source in an authentication rule?

Which of the following objects is a valid source in an authentication rule?

A.
Host@Any
B. User@Network

C.
User_group@Network

D.
User@Any