A customer wants to use the RADIUS proxy feature in the Junos Pulse Access Control Service
with an existing RADIUS server that has a populated user file for EAP authentication.
Which two considerations must the customer take into account? (Choose two.)
A.
RADIUS proxy allows the use of roles and role restrictions.
B.
RADIUS proxy allows you to skip the role assignment process.
C.
RADIUS proxy needs Windows Domain Controller in the backend.
D.
Inner proxy configuration passes authentication data in cleartext to external RADIUS servers.