A network administrator needs to ensure that users are authenticated before they are given access to the network. Which of the following BEST meets these requirements?

A. 802.1s
B. 802.1d
C. 802.1x
D. 802.1w

Answer: C. 802.1x

Computer Science & Information Technology

You might also like to view...

Alice lets us build programs consisting of statements, in which we often send messages to ____.

A. classes B. objects C. functions D. methods

Computer Science & Information Technology

The ____ file format can store both vector and bitmap data.

a. JPEG b. GIF c. PSD d. EPS

Computer Science & Information Technology