Your security department requests that you enable access to a secure resource on a per-user
basis. These users can log in from multiple devices on the network.
Which two actions should be taken to allow this? (Choose two.)

A.
Configure inbound and outbound dynamic ACLs.
B.
Configure inbound dynamic ACLs and inbound vendor-specific attributes.
C.
Configure dynamic VLANs in RADIUS and inbound IP ACLs.
D.
Configure global strict security and multiple inbound IP ACLs.