Question 7: Which method do you find most effective for controlling end-user access to a network? Poll: (choose answer - no wrong answer): () Network Profiling () Identity-Based Authentication () Cisco TrustSec () Change of Authorization (CoA) Answer: Network Profiling