Which configuration setting in the Junos Pulse Access Control Service would you use to accomplish this task?
Which two prerequisites should your IT Information security team consider about the authentication protocol set configuration at both the endpoint and the controller side?
What are three remediation actions that you enable for a Host Checker policy that would apply to an antivirus rule?