Which two statements apply to dynamic access lists?()
- A they offer simpler management in large internetworks.
- B you can control logging messages.
- C they allow packets to be filtered based on upper-layer session information.
- D you can set a time-based security policy.
- E they provide a level of security against spoofing.
- F they are used to authenticate individual users.