Which two requirements call for the deployment of 802.1X? (Choose two.)
A.
authenticate users on switch or wireless ports
B.
validate security posture using TACACS+
C.
grant or deny network access, at the port level, based on configured authorization policies
D.
permit network access during the quiet period
E.
deploy Cisco Secure ACS as the policy server