When you implement 802.1x authentication on the ACS, which two configurations are performed
under the ACS System Configuration? (Choose two.)
A.
Global Authentication Setup
B.
NAPs
C.
Groups
D.
RACs
E.
Logging
F.
Users
When you implement 802.1x authentication on the ACS, which two configurations are performed
under the ACS System Configuration? (Choose two.)
When you implement 802.1x authentication on the ACS, which two configurations are performed
under the ACS System Configuration? (Choose two.)
A.
Global Authentication Setup
B.
NAPs
C.
Groups
D.
RACs
E.
Logging
F.
Users