多项选择题
A. A device is trusted if it correctly classifies packets.
B. A device is trusted if it correctly declassifies packets.
C. The outermost trusted devices represent the trust boundary.
D. Classification and marking occur using 802.1ab QoS bits before reaching the trust boundary.
E. Network trust boundaries are automatically configured in IOS version 12.3 and later.
F. For scalability, classification should be done as close to the edge as possible.
单项选择题 Refer to the exhibit. Which statement is true about where trust boundaries should be established in a network?()
单项选择题 Refer to the exhibit. When a profile is configured in the Aironet Desktop Utility, which security option permits the configuration of host-based Extensible Authentication Protocol (EAP)?()
单项选择题 WhichissueorsetofissuesdoestheLightweightAccessPointProtocol(LWAPP)address?()