You are installing a new deployment of the Junos Pulse Access Control Service. In your environment, you have VoIP handsets that support 802.1X authentication with EAP-MD5.
Which deployment constraint must you consider?
A.
EAP-MD5 is not supported by the Junos Pulse Access Control Service
B.
EAP-MD5 requires passwords to be stored in an encrypted format.
C.
EAP-MD5 requires passwords to be stored in a clear text format.
D.
EAP-MD5 performs a real time hash of the handset’s MAC address.