You administer a network containing SRX Series firewalls. New policy requires that you implement
MAG Series devices to provide access control for end users. The policy requires that the SRX
Series devices dynamically enforce security policy based on the source IP address of the user.
The policy also requires that the users communicate with protected resources using encrypted
traffic.
Which two statements are true? (Choose two.)
A.
The endpoints can use agentless access.
B.
Encrypted traffic flows between the endpoint and the enforcer.
C.
Encrypted traffic flows between the endpoint and the protected resource
D.
The endpoints can use the Odyssey Access Client.