A ________ is a secret key shared by the AP and a STA and installed in some fashion outside the scope of IEEE 802.11i.

A, pre-shared key B. master session key

C. pairwise master key D. group master key


A, pre-shared key

Computer Science & Information Technology

You might also like to view...

List the four functions that the EBK specifies should be inspected regularly to ensure the continuing integrity of the data security controls.

What will be an ideal response?

Computer Science & Information Technology

Generic classes in C++ are created using the structure called a ______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Use the ________ button to paste unformatted text into Word from another application

Fill in the blank(s) with correct word

Computer Science & Information Technology

People attending presentations tend to do all of the following except _____.

A. hear the speaker B. read bulleted lists C. see diagrams D. see illustrations

Computer Science & Information Technology