If authentication is performed by IEEE 802.1x using the WPA or WPA2 Enterprise model, the distribution of the ____, from which all other keys are formed, is done by the authentication server.

A. pairwise master key (PMK)
B. master key (MK)
C. pairwise transient key (PTK)
D. key confirmation key (KCK)


Answer: B

Computer Science & Information Technology

You might also like to view...

Chicago Fifteenth Edition is a citation style

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is a hardware-based IDS that used Red Hat Linux as its operating system?

a. Snort b. Specter c. Cisco IDS 4200 Series d. Cisco Catalyst 6500 Series

Computer Science & Information Technology

A(n) ____________________ is a series of stored commands that can be run whenever you need to perform a task.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A smartphone's screen is measured in characters per inch. ____________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology