Which protocols can be used to authenticate media-level access control, offer the capability to permit or deny
network connectivity, control VLAN access, and apply traffic policy, based upon user or machine identity?
When connecting two different VLAN Trunk Protocol domains together via an ISL trunk, the switches fail to form the trunk automatically. What is the likely cause?