A system administrator needs to implement 802.1x whereby when a user logs into the network, the
authentication server communicates to the network switch and assigns the user to the proper VLAN.
Which of the following protocols should be used?
A.
RADIUS
B.
Kerberos
C.
LDAP
D.
MSCHAP