Which two statements are true regarding firewall user authentication? (Choose two.)
A.
When configured for pass-through firewall user authentication, the user must first open a
connection to the Junos security platform before connecting to a remote network resource.
B.
When configured for Web firewall user authentication only, the user must first open a
connection to the Junos security platform before connecting to a remote network resource.
C.
If a Junos security device is configured for pass-through firewall user authentication, new
sessions are automatically intercepted to perform authentication.
D.
If a Junos security device is configured for Web firewall user authentication, new sessions are
automatically intercepted to perform authentication.