What is true about using EAP-Transport Layer Security (EAP-TLS) in the 802.1X process?
A. Supplicants use a non-reversible hash to submit all login credentials.
B. Supplicants are required to authenticate using digital certificates.
C. EAP-TLS provides a flexible security framework, which can be customized for each environment.
D. Supplicant and application servers are required to mutually authenticate with a username and password, which are encrypted before being transmitted.