What are three necessary steps for enabling 802.1X access when configuring Layer 2
enforcement? (Choose three.)
A.
Configure a location group
B.
Create an authentication protocol set
C.
Configure the RADIUS AV pair list
D.
Configure RADIUS clients
E.
Configure role and role-mapping rules