Which two statements are true about the integration of the Junos Pulse Access Control Service
with Security Threat Response Manager (STRM)? (Choose two.)
A.
To integrate with STRM, preshared keys must be used between the Junos Pulse Gateway and
STRM.
B.
The benefit of integrating the Junos Pulse Access Control Service with STRM is the ability to
associate specific users to security breaches.
C.
To integrate with STRM, you should configure the STRM IP address as a syslog server in the
Junos Pulse Gateway.
D.
The benefit of integrating the Junos Pulse Access Control Service with STRM is to reduce the
load of logging in clustered environments.
Explanation: