which three protocols are allowed through the switch port before authentication takes place?

In the use of 802.1X access control, which three protocols are allowed through the switch port
before authentication takes place? (Choose three.)

In the use of 802.1X access control, which three protocols are allowed through the switch port
before authentication takes place? (Choose three.)

A.
EAP MD5

B.
TACACS+

C.
EAP-over-LAN

D.
CDP

E.
protocols not filtered by an ACL

F.
STP



Leave a Reply 0

Your email address will not be published. Required fields are marked *