An administrator wants to use LDAP, TACACS+, and Kerberos as external authentication services for authenticating users.What should the administrator be aware of regarding the authentication sequence, based on the Authentication profiles in the order Kerberos, LDAP, and TACACS+?
A. The priority assigned to the Authentication profile defines the order of the sequence
B. The firewall evaluates the profiles in the alphabetical order the Authentication profiles have been named until one profile successfully authenticates the user
C. If the authentication times out for the first Authentication profile in the authentication sequence, no further authentication attempts will be made
D. The firewall evaluates the profiles in top-to-bottom order until one Authentication profile successfully authenticates the user