You have created a security policy on an SRX240 that permits traffic from any source-address,
any destination-address, and any application. The policy will be a source IP policy for use with the
Junos Pulse Access Control Service.
What must you add to complete the security policy configuration?
A.
The intranet-auth authentication option
B.
The redirect-portal application service
C.
The uac-policy application service
D.
The ipsec-vpn tunnel