You are receiving reports of possible unauthorized access to resources protected by a firewall
enforcer running the Junos OS. You want to verity which users are currently accessing resources
through the enforcer.
Which command should you use to verify user access on the enforcer?
A.
show services unified-access-control authentication-table
B.
show auth table
C.
show services unified-access-control policies
D.
show services unified-access-control captive-portal