When setting up a wireless network, an administrator enters a pre-shared key for security. Which of the
following is true?
A.
The key entered is a symmetric key used to encrypt the wireless data.
B.
The key entered is a hash that is used to prove the integrity of the wireless data.
C.
The key entered is based on the Diffie-Hellman method.
D.
The key is an RSA key used to encrypt the wireless data.