You want to create a security policy on an SRX240 that redirects unauthenticated users back to
the Junos Pulse Access Control Service.
Which two steps must you take to accomplish this task? (Choose two.)
A.
Configure a captive-portal service that redirects all traffic back to the Junos Pulse Access
Control Service.
B.
Configure a security policy that references the unified-access-control captive-portal service.
C.
Configure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse
Access Control Service.
D.
Configure a security policy that references the unified-access-control intranet-controller service.