You can configure user authentication at Layer 2 of the OSI. What IEEE standard would you use for this?
A) IEEE 802.1X
B) IEEE 802.1D
C) IEEE 802.2x
D) IEEE 802.3af
A
Explanation: A standards-based method of enforcing user authentication is IEEE 802.1X.
Computer Science & Information Technology
You might also like to view...
What is the advantage of fusion splicing over mechanical splicing?
What will be an ideal response?
Computer Science & Information Technology
What command is used to change a router’s hostname to Tech-router?
What will be an ideal response?
Computer Science & Information Technology
By default, an audio plays across multiple slides
Indicate whether the statement is true or false
Computer Science & Information Technology
?The TCP header ____ field contains a 32-bit value that counts bytes and indicates a packet's data position within the connection.
A. ?Source Port B. ?Padding C. ?Sequence Number D. ?Window
Computer Science & Information Technology