Which two options best describe the authorization process as it relates to network access?
(Choose two.)
A.
the process of identifying the validity of a certificate, and validating specific fields in the
certificate against an identity store
B.
the process of providing network access to the end user
C.
applying enforcement controls, such as downloadable ACLs and VLAN assignment, to the
network access session of a user
D.
the process of validating the provided credentials
Explanation: