Which three statements about hosts moving from port to port on the same switch that is
configured for 802.1X are true? (Choose three.)
A.
The 3k-access(config-if)# authentication violation replace command can be used to allow
a new host to authenticate to an IP phone that is not manufactured by Cisco.
B.
The 3k-access(config)# authentication mac-move permit command can be used to allow
a host to disconnect from an IP phone that is not manufactured by Cisco and authenticate
on a different port on the same switch.
C.
The 3k-access(config-if)# authentication violation replace command can be used to allow
a host to disconnect from an IP phone that is not manufactured by Cisco and authenticate
on a different port on the same switch.
D.
Cisco IP phones send a RADIUS packet with Cisco-av-pair UCPort= Disco to signal to
the Cisco Catalyst switch that the tethered PC has disconnected.
E.
The 3k-access(config)# authentication mac-move permit command can be used to allow
a new host to authenticate to an IP phone that is not manufactured by Cisco Cisco IP
phones use Cisco Discovery Protocol to signal to the Cisco Catalyst switch that the tethered
PC has disconnected.