Complete this statement from the options provided. Using Captive Portal, unidentified users may be
either; blocked, allowed to enter required credentials, or required to download the _____________.
A.
ICA Certificate
B.
SecureClient
C.
Full Endpoint Client
D.
Identity Awareness Agent