Ideally, which one of the following commands should you use to configure port-based authentication to interactively authenticate a connected device via 802.1X?

Select Answer

  • dot1x port-control negotiate


  • dot1x port-control auto


  • dot1x port-control force-authorized


  • dot1x port-control force-unauthorized


Overview


Previous
Next
QUESTION 1 of 13

Securing Switch Access


Ideally, which one of the following commands should you use to configure port-based authentication to interactively authenticate a connected device via 802.1X?

Select Answer

  • dot1x port-control negotiate


  • dot1x port-control auto


  • dot1x port-control force-authorized


  • dot1x port-control force-unauthorized