Which two statements about MACsec are true? (Choose two)
A.
It is best deployed at the access layer, close to the switch port
B.
It store per-DNS broadcast information in radius accounting records.
C.
Each endpoint’s MACsec policy is define by the authentication server.
D.
the distribution and core layers in the network can be segregated
E.
It works in conjunction with 802.11 wireless technologies