Which two prerequisites should your IT Information security team consider about the authentication protocol set configuration at both the endpoint and the controller side?
Which configuration setting in the Junos Pulse Access Control Service would you use to accomplish this task?
Which two devices are supported by the Junos Pulse Access Control Service as an 802.1X authenticator?