Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.
Which set of role access restrictions must you configure to enforce this security policy?
Source IP and browser
Source IP and certificate
Certificate and Host Checker
Host Checker and source IP