Correlation policy rules allow you to construct criteria for alerting on very specific conditions.
Which option is an example of such a rule?
A.
enforcing two-factor authentication for access to critical servers
B.
issuing an alert if a noncompliant operating system is detected or if a host operating
system changes to a noncompliant operating system when it was previously profiled as a
compliant one
C.
testing password strength when accessing an application
D.
limiting general user access to administrative file shares