A NetScaler Engineer needs to audit extended Access Control List (ACL) hits.
Which two areas would the engineer enable logging so that the ACL hits could be stored in the /var/log/ns.log? (Choose two.)
A. The ACL
B. The syslogAction
C. The nslog parameters
D. The syslog parameters