When using endpoint access control, which two access methods are valid for authentication and authorization? (Choose two.)
A . Microsoft Challenge Handshake Authentication
B . Protected extensible authentication
C . MAC Authentication Bypass
D . Password Authentication Protocol Bypass
E . Web authentication
Answer: C, E