Identity Awareness allows the Security Administrator to configure network access based on which of the following? A. Name of the application, identity of the user, and identity of the machine B. Identity of the machine, username, and certificate C. Network…