In which two situations is web authentication appropriate? (Choose two.)
A. When secure connections to the network are unnecessary.
B. When a fallback authentication method is necessary
C. When devices outside the control of the organization’s IT department are permitted to connect to the network.
D. When WEP encryption must be deployed on a large scale.
E. When 802.1x authentication is required.