What authentication mechanism is being followed here?

Jackson discovers that the wireless AP transmits 128 bytes of plaintext, and the station responds by encrypting the plaintext. It then transmits the resulting ciphertext using the same key and cipher that are used by WEP to encrypt subsequent network traffic. What authentication mechanism is being followed here?

Jackson discovers that the wireless AP transmits 128 bytes of plaintext, and the station responds by encrypting the plaintext. It then transmits the resulting ciphertext using the same key and cipher that are used by WEP to encrypt subsequent network traffic.

What authentication mechanism is being followed here?

A.
no authentication

B.
single key authentication

C.
shared key authentication

D.
open system authentication

Explanation:
The following picture shows how the WEP authentication procedure: (Exhibit)



Leave a Reply 0

Your email address will not be published. Required fields are marked *