What is true about the operation of the Infranet Enforcer? ()
A. It assigns users a set of roles.
B. It allows access based on auth table entries.
C. It verifies whether an endpoint meets security requirements.
D. It configures the UAC agent to allow or deny access to resources.