In 802.1XEAP-TLS, how can a network administrator control network access of corporate
users?

A.
by selecting which user groups are entitled to deploy a certificate on their endpoints
B.
by selecting which endpoints are entitled to install a certificate
C.
by defining corporate users as guests
D.
by disabling or deleting the user’s endpoint in User Access Manager