A. Layer 2 B. Layer 3 C. in-band D. out-of-band E. edge F. central
A. NAC can authenticate using 802.1X and IBNS cannot B. NAC can ensure only compliant machines connect and IBNS cannot C. NAC can ensure access to the correct network resources and IBNS cannot D. NAC can manage user mobility and reduce overhead costs and IBNS cannot
A. interface bandwidth B. rescan timer interval C. total number of network devices D. number of new user authentications per second E. which operating system is loaded on the client F. number of checks performed in a posture assessment.