In the use of 802.1x access control, which three protocols are allowed through the switch port before
authentication takes place? Select three
A.
STP
B.
CDP
C.
EAP MD5
D.
TACACS+
E.
EAP-over-LAN
F.
Protocols not filtered by an ACL
In the use of 802.1x access control, which three protocols are allowed through the switch port before
authentication takes place? Select three
In the use of 802.1x access control, which three protocols are allowed through the switch port before
authentication takes place? Select three
A.
STP
B.
CDP
C.
EAP MD5
D.
TACACS+
E.
EAP-over-LAN
F.
Protocols not filtered by an ACL