A user complains that they cannot reach a destination host using Telnet The user expresses concern that the SRX Series device is blocking the connection attempt. You check the security policy log on the SRX device and see the entry shown in the exhibit.
Based on the security policy log entry, which three statements describe why the user is unable to use Telnet to reach the destination host? (Choose three.)
A.
No security policy is configured on the SRX device to match the request.
B.
The destination host does not have a valid route for the user’s PC.
C.
The destination host is not listening on the requested service.
D.
Another device between the SRX device and destination host is blocking the request.
E.
A trace options flag is set on the SRX device to drop the telnet traffic