Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.
Which set of role access restrictions must you configure to enforce this security policy?
![PrepAway - Latest Free Exam Questions & Answers](https://www.briefmenow.org/img/pa5.jpg)
A.
Source IP and browser
B.
Source IP and certificate
C.
Certificate and Host Checker
D.
Host Checker and source IP