In the use of 802.1X access control, which three protocols are allowed through the switch port
before authentication takes place? (Choose three.)
A.
EAP MD5
B.
TACACS+
C.
EAP-over-LAN
D.
CDP
E.
protocols not filtered by an ACL
F.
STP
In the use of 802.1X access control, which three protocols are allowed through the switch port
before authentication takes place? (Choose three.)
In the use of 802.1X access control, which three protocols are allowed through the switch port
before authentication takes place? (Choose three.)
A.
EAP MD5
B.
TACACS+
C.
EAP-over-LAN
D.
CDP
E.
protocols not filtered by an ACL
F.
STP