A company is deploying a new 802.1X port-based security infrastructure to allow users to access resources through wired Ethernet ports. However they recently deployed an RSA token-based system for users to connect remotely. The network administrator wants to reuse the same security
database for 802.1X port-based security.
Which 802.1X authentication protocol is required?
A.
EAP-TLS
B.
LAN-PEAP
C.
RSA-EAP
D.
EAP-TTLS