A company is deploying a new 802.1X port-based security infrastructure to allow users to
access resources through wired Ethernet ports. However they recently deployed an RSA
token-based system for users to connect remotely. The network administrator wants to
reuse the same security database for 802.1X port-based security. Which 802.1X
authentication protocol is required?
A.
EAP-TLS
B.
LAN-PEAP
C.
RSA-EAP
D.
EAP-TTLS