Which access control component, implementation, or protocol is based on device roles of supplicant, authenticator, and authentication server?
- 802.1X
- accounting
- authorization
- authentication
Explanation & Hint:
The access control component that is based on the device roles of supplicant, authenticator, and authentication server is 802.1X. Here’s an explanation of its roles: 802.1X: This is a network access and control protocol that operates with three key roles:
The other components mentioned (Accounting, Authorization, Authentication) do not specifically utilize this triad of roles in their processes. Accounting involves tracking and logging network usage, Authorization deals with granting permissions to a user or device, and Authentication is the process of verifying identity, but none of these use the specific supplicant-authenticator-authentication server model inherent to 802.1X. |