If authentication is performed by IEEE 802.1x using the WPA or WPA2 Enterprise model, the distribution of the ____, from which all other keys are formed, is done by the authentication server.

A. pairwise master key (PMK)
B. master key (MK)
C. pairwise transient key (PTK)
D. key confirmation key (KCK)


Answer: B

Computer Science & Information Technology

You might also like to view...

____________________ refers to how opaque something is.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ________ file extension is a good choice when working with images containing simple blocks of colors

Fill in the blank(s) with correct word

Computer Science & Information Technology

Icons will work well on only black backgrounds.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The original definition of ____ is a software security vulnerability in Web applications that can be used by an attacker to compromise the same origin policy of client-side scripting languages.

A. denial of service B. cross-site scripting C. phishing D. SQL injection

Computer Science & Information Technology