Which three elements are used for role restrictions?

Which three elements are used for role restrictions? (Choose three.)

Which three elements are used for role restrictions? (Choose three.)

A.
browser

B.
LDAP attribute

C.
username

D.
source IP

E.
certificate

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *