A company recently experienced a data breach when an unauthorized user accessed the network.
Which questions should the network architect ask to identify an affective access solution to
prevent unauthorized access in the future? (Select two)

A.
Do users have legacy device that do not support 802.1X?
B.
Does the company have the resources required to train users on remediation services?
C.
Does the company’s firewall support access control lists (ACL)?
D.
Does the company have an existing RADIUS server?
E.
Do users devices support Secure Shell (SSH)?
A, D is correct. SSH is not an access solution
0
0
or A, C.. im more towards A, C
0
0
802.1x with radius can handle unauthorized user connecting to the network
firewall ACL is per ip,subnet,port,protocol etc
i think it’s A and D
0
0