Which of the following are correct about hardware SACG authentication deployment scenario? (Multiple choices)

Which of the following are correct about hardware SACG authentication deployment scenario? (Multiple choices)
A . SACG authentication is generally used in stable network scenarios where wired admission control is performed.
B . SACG authentication is generally used in scenarios where new networks are set up for wireless admission control.
C . SACG is generally deployed in bypass mode without changing the original network topology.
D . SACG essentially controls access to users through 802.1X technology.

Answer: AC

Leave a Reply

Your email address will not be published.

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>