Your company wants to allow for differentiated access on Windows laptops depending on whether
they are corporate assets or personal assets.
Which Host Checker rule would be used for this purpose?
A.
A predefined rule that verifies virus signatures are up-to-date.
B.
A custom rule that validates the computer vendor name.
C.
A custom rule that verifies a file exists.
D.
A custom rule that validates the serial number.
Explanation: