【单选题】You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all...
A.
Delete the default auth table mapping policy
B.
Create auth table mapping policies that route users to specific resources
C.
Create Resource Access policies that permit access to specific resources
D.
Create Source Interface policies that route users to specific resources