How is unicast encryption implemented on the client?

A wireless client has finished 802.1X and EAP using WPA2 with a controller-based AP network using a central AAA server. How is unicast encryption implemented on the client?

A wireless client has finished 802.1X and EAP using WPA2 with a controller-based AP network using a central AAA server. How is unicast encryption implemented on the client?

A.
The client uses the PMK that is sent from the AAA server that is derived from EAP authentication.

B.
The client uses the PTK that is sent from the WLC, which was derived from the PMK that is sent from the AAA server.

C.
The client uses the PTK that is derived from EAP authentication.

D.
The client uses the PMK that is derived from a four-way handshake with the AP.

E.
The client uses the PTK that is derived from a four-way handshake with the AP.

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *