Which three statements about the keying methods used by MACSec are true? (Choose
three.)
A.
Key management for host-to-switch and switch-to-switch MACSec sessions is
provided by MKA.
B.
A valid mode for SAP is NULL.
C.
MKA is implemented as an EAPoL packet exchange.
D.
SAP is enabled by default for Cisco TrustSec in manual configuration mode.
E.
SAP is not supported on switch SVIs.
F.
SAP is supported on SPAN destination ports.