When using endpoint access control, which two access methods are valid for authentication and authorization?

When using endpoint access control, which two access methods are valid for authentication and authorization? (Choose two.)
A. Microsoft Challenge Handshake Authentication
B. Protected extensible authentication
C. MAC Authentication Bypass
D. Password Authentication Protocol Bypass
E. Web authentication

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.