Which three elements are used for role restrictions?

Which three elements are used for role restrictions? (Choose three.)

Which three elements are used for role restrictions? (Choose three.)

A.
browser

B.
LDAP attribute

C.
username

D.
source IP

E.
certificate



Leave a Reply 0

Your email address will not be published. Required fields are marked *