An outside vendor is eligible for the guest role and the contractor role when accessing your network, that is secured with the Junos Pulse Access Control Service.
What is the default role-mapping behavior?
A.
The vendor must select a role from a list of eligible roles.
B.
The vendor must select a rule from a list of eligible rules.
C.
The vendor is automatically mapped to the first configured role
D.
The vendor is automatically granted a merged role.