A.The best match of the ACL entries will be used for granularity of control.
B.They use source IP information for matching operations.
C.They use source and destination IP information for matching operations.
D.They use source IP information along with protocol-type information for finer granularity of control.