When you implement 802.1x authentication on the ACS, which two configurations are performed under the ACS System Configuration? (Choose two.)
A.
Users
B.
Groups
C.
Global Authentication Setup
D.
RACs
E.
Logging
F.
NAPs
When you implement 802.1x authentication on the ACS, which two configurations are performed under the ACS System Configuration? (Choose two.)
When you implement 802.1x authentication on the ACS, which two configurations are performed under the ACS System Configuration? (Choose two.)
A.
Users
B.
Groups
C.
Global Authentication Setup
D.
RACs
E.
Logging
F.
NAPs