1X access control, which three protocols are allowed through the switch port before authentication takes place? (Choose three

In the use of 802.1X access control, which three protocols are allowed through the switch port before authentication takes place? (Choose three.)

In the use of 802.1X access control, which three protocols are allowed through the switch port before authentication takes place? (Choose three.)

A.
STP

B.
CDP

C.
EAP MD5

D.
TACACS+

E.
EAP-over-LAN

F.
protocols not filtered by an ACL



Leave a Reply 0

Your email address will not be published. Required fields are marked *