Which five options are results of that exchange being used on a controller-based network?

When the enterprise-based authentication method is used for WPA2, a bidirectional handshake
exchange occurs between the client and the authenticator.
Which five options are results of that exchange being used on a controller-based network?
(Choose five.)

When the enterprise-based authentication method is used for WPA2, a bidirectional handshake
exchange occurs between the client and the authenticator.
Which five options are results of that exchange being used on a controller-based network?
(Choose five.)

A.
a bidirectional exchange of a nonce used for key generation

B.
binding of a Pairwise Master Key at the client and the controller

C.
creation of the Pairwise Transient Key

D.
distribution of the Group Transient Key

E.
distribution of the Pairwise Master key for caching at the access point

F.
proof that each side is alive



Leave a Reply 3

Your email address will not be published. Required fields are marked *


nephelai

nephelai

no access point

nephelai

nephelai

Answer: ABCDF Explanation: Regardless of whether WPA or WPA2 is used during the initial connection between the station and the AP, the two agree on common security requirements. Following that agreement, a series of important key related activities occur in this specific order