A company wants to make sure that users are required to authenticate prior to being allowed on the network.
Which of the following is the BEST way to accomplish this?
A.
802.1x
B.
802.1p
C.
Single sign-on
D.
Kerberos
Explanation:
For security purposes, some switches require users to authenticate themselves (that is, provide credentials,
such as a username and password, to prove who they are) before gaining access to the rest of the network. A
standards-based method of enforcing user authentication is IEEE 802.1X.