What are the steps for creating a pairwise master key (PMK)?
What will be an ideal response?
The IEEE standard defines two ways in which wireless devices and APs can retrieve a PMK. The difference depends on the security model that is being used. If the Wi-Fi Protected Access (WPA) Personal security model or WPA2 Personal security model is being used, then a preshared key (PSK) is entered by a user into both the access point and the wireless device (usually as a passphrase, which can be between 8 and 63 characters). This PSK is then used in conjunction with the service set identifier (SSID) to form the mathematical basis of the PMK on the wireless device as well as on the access point.
If authentication is performed using the WPA orWPA2 Enterprise security model, the PMK is generated by the RADIUS server and sent to the access point. The wireless device,which has already received the PM from the authentication server, will use it to generate its own PMK.
You might also like to view...
The Do While…Loop statement behaves like a While…End While statement except _________.
a) The Do While…Loop statement will execute the body once before checking the condition. b) The Do While…Loop statement will execute the body once more after the loop terminates. c) a and b d) nothing (there is no difference)
The sequence which operations are performed is determined by the order of operations
Indicate whether the statement is true or false
The color wheel is made up of _________________________ .
a. three primaries, three secondaries, and six intermediate colors b. three primaries, four secondaries, and four intermediate colors c. three primaries, three secondaries, three intermediates, and three near mediate colors
Define a trunk port.
What will be an ideal response?