You administer a network with Windows-based endpoints that have custom software images. You
want to use Host Checker to require that endpoints are running the custom software image.
Which two Host Checker policy rules would be used to enforce this requirement? (Choose two.)
A.
Isolate a file name unique to the custom image and create a custom rule-type of “File” which
matches on the file. Select the “Required” option under the custom rule.
B.
Identify the MAC address unique to network cards installed in PCs with the custom image and
create a custom rule-type of “MAC Address” which matches on the appropriate MAC address.
Select the “Required” option under the custom rule
C.
Identify the IP address unique to the network cards installed in PCs with the custom image and
create a custom rule-type of “IP Address” which matches on the appropriate IP address. Select
the “Required” option under the custom rule.
D.
Isolate or create a unique Windows registry key for the custom image and create a custom ruletype of “Registry Setting” which matches on the name of the registry key.