You are deploying IP phones in your enterprise networks. When plugged in, the IP phones must automatically negotiate the power requirements for the new connection with the EX Series switches.
In this scenario, which protocol should be used to enable this behavior?
Your organization has recently acquired another company. You must carry all of the company’s existing VLANs across the corporate backbone to the existing branch locations without changing addressing and with minimal configuration.
Which technology will accomplish this task?
You are asked to enforce user authentication using a captive portal before users access the corporate network.
Which statement is correct in this scenario?