While designing a remote access VPN, a customer has requested three different levels of access to be granted for administrators, employees, and partners.
Which three access policies must be configured for the three groups? (Choose three.)
A. Partners are centrally authenticated with limited network access controlled with ACLs.
B. Administrative users have local credentials with full access to the internal infrastructure.
C. Administrative users are centrally authenticated with full access to the internal infrastructure.
D. Employees are centrally authenticated with limited network access controlled with ACLs.
E. Employees are centrally authenticated with full access to the internal infrastructure.
F. Partners are centrally authenticated with full access to the internal infrastructure.