In what places can an access role be used?
A. In the Application & URL Filtering rule base
B. In the security rule base and DLP policy
C. In the security rule base and in the Application & URL Filtering rule base
D. Access roles can only replace the legacy authentication methods