You have created a security policy on an SRX240 that permits traffic from any source-address, any destination-address, and any application. The policy will be a source IP policy for use with the Junos Pulse Access Control Service.
	What must you add to complete the security policy configuration?()
	A. The intranet-auth authentication option
	B. The redirect-portal application service
	C. The uac-policy application service
	D. The ipsec-vpn tunnel
 
                            