What are two valid configurations for user-driven remediation when a Windows-based endpoint
fails a Host Checker policy? (Choose two.)
A.
Kill a running process on the endpoint, based on executable name and MD5 checksum.
B.
Delete a file on the endpoint’s file system.
C.
Download and run a remediation executable from the local software distribution server.
D.
Alter registry entries to prevent future execution of an executable, based on executable name
and full path.