With enforcement for network access policies and at-risk hosts enabled, what will happen if a host matches a network access policy and has a state of "at risk"?
- A. The host is provisioned based on the network access policy
- B. The host is provisioned based on the default access defined by the point of connection
- C. The host is isolated
- D. The host is administratively disabled