When using endpoint access control, which two access methods are valid for authentication and authorization? (Choose two.)
A. Microsoft Challenge Handshake Authentication
B. Protected extensible authentication
C. MAC Authentication Bypass
D. Password Authentication Protocol Bypass
E. Web authentication