A system administrator wants to ensure that only authorized devices can connect to the wired and wireless corporate system. Unauthorized devices should be
automatically be placed on a guest network. Which of the following MUST be implemented to support these requirements? (Select TWO).
A.
Port security
B.
802.1X
C.
Proxy
D.
VLAN
E.
NAT