You can configure user authentication at Layer 2 of the OSI. What IEEE standard would you use for this?

A) IEEE 802.1X
B) IEEE 802.1D
C) IEEE 802.2x
D) IEEE 802.3af


A
Explanation: A standards-based method of enforcing user authentication is IEEE 802.1X.

Computer Science & Information Technology

You might also like to view...

What is the advantage of fusion splicing over mechanical splicing?

What will be an ideal response?

Computer Science & Information Technology

What command is used to change a router’s hostname to Tech-router?

What will be an ideal response?

Computer Science & Information Technology

By default, an audio plays across multiple slides

Indicate whether the statement is true or false

Computer Science & Information Technology

?The TCP header ____ field contains a 32-bit value that counts bytes and indicates a packet's data position within the connection.

A. ?Source Port B. ?Padding C. ?Sequence Number D. ?Window

Computer Science & Information Technology