What are two reasons proxy accounts are preferred to explicit access control strings for network
access between systems? Select two.

A.
remote access control strings can be shared without security risk
B.
proxy access is secure against password capture by packet sniffer
C.
proxy access means passwords aren’t stored in DCL recall buffers
D.
access control strings can be safely embedded in command procedures
E.
proxy access avoids the risk of “spoofing” (node impersonation)