Users with Identity Awareness Agent installed on their machines login with __________, so that
when the user logs into the domain, that information is also used to meet Identity Awareness
credential requests.
A.
ICA Certificates
B.
Key-logging
C.
Secure Client
D.
Single Sign-On