Your security policy requires that users authenticating to the Junos Pulse Access Control Service
are connecting from a domain member endpoint on the internal corporate network.
Which set of role access restrictions must you configure to enforce this security policy?
A.
Source IP and browser
B.
Source IP and certificate
C.
Certificate and Host Checker
D.
Host Checker and source IP
Explanation: