When the enterprise-based authentication method is used for WPA2, a bidirectional handshake exchange occurs between the client and the authenticator. Which five options are results of that exchange being used on a controller-based network? (Choose five.)
A.
a bidirectional exchange of a nonce used for key generation
B.
binding of a Pairwise Master Key at the client and the controller
C.
creation of the Pairwise Transient Key
D.
distribution of the Group Transient Key
E.
distribution of the Pairwise Master key for caching at the access point
F.
proof that each side is alive
Explanation: