What is true of standard access control lists when applied to an interface to control inbound or outbound traffic?()
- AThe best match of the ACL entries will be used for granularity of control.
- BThey use source IP information for matching operations.
- CThey use source and destination IP information for matching operations.
- DThey use source IP information along with protocol-type information for finer granularity of control.