单项选择题
A. Infranet Enforcer firmware B. Infranet Controller rollback software C. Host Security Assessment Plug-in (HSAP) D. Endpoint Security Assessment Plug-in (ESAP)
A. SSID B. login name C. MAC address D. wired adapters E. encryption method
A. It assigns users a set of roles. B. It allows access based on auth table entries. C. It verifies whether an endpoint meets security requirements. D. It configures the UAC agent to allow or deny access to resources.