Describe shared key authentication.
What will be an ideal response?
With shared key authentication, both the AP and the station are given the same key value in advance. (In other words, they "share" the key value.) The station first sends an authentication frame to the AP, and the AP responds with an authentication frame that contains a block of text known as the challenge text. The station must encrypt the text with its key value and return it to the AP in an authentication frame. The AP will then decrypt what was returned with its own key to see if it matches the original challenge text. If it does, the AP sends an authentication frame signifying the result of the authentication.
You might also like to view...
A crosstab query must contain at least one row heading, one column heading, and one ________ field
Fill in the blank(s) with correct word
A program that records all of your keystrokes and then sends that information to someone else is called a(n):
A) keyboard recorder B) keystroke recorder C) keyboard log D) keystroke logger
What can Web programmers add to an HTML/XHTML element to cause the browser to modify the default behavior of the element?
A) modifier B) tag C) extension D) attribute
COGNITIVE ASSESSMENT You want to clear the memory on your mobile device. Which of the following is sufficient?
A. cold boot B. warm boot C. new boot D. soft boot