A company is deploying a new 802.1X port-based security infrastructure to allow users to access
resources through wired Ethernet ports. However they recently deployed an RSA token-based
system for users to connect remotely. The network administrator wants to reuse the same security
database for 802.1X port-based security.
Which 802.1X authentication protocol is required?