1. Juniper Networks. (2023). Juniper Identity Management Service (JIMS) Administration Guide.
Reference: In the "Understanding How JIMS Collects User Identity Information" section
it states: "If JIMS does not find a user for an IP address in the event log source
it can probe the PC with that IP address to get the username of the logged-in user." This directly supports option B as the correct trigger for a PC probe.
Reference: The same guide
in the "Configure an Active Directory Source" section
details how JIMS uses LDAP to query for group information
which invalidates option C.
Reference: The overall architecture described in the guide shows the SRX as a client of JIMS
querying it for information. JIMS is the component that actively collects data
invalidating option D.