You want to restrict access to a role based on the client machine from which the user is accessing
the network.
Which two role restrictions accomplish this goal? (Choose two.)
A.
user name
B.
password length
C.
certificate
D.
Host Checker
Explanation: