You are the network consultant from Your company. Please point out two requirements that call for the
deployment of 802.1X.
A.
Authenticate users on switch or wireless ports
B.
Grant or Deny network access at the port level, based on configured authorization policies
C.
Allow network access during thequeit period
D.
Verify security posture using TACAS+