Describe the main characteristics of the shared key authentication method.

What will be an ideal response?


Shared key authentication is an authentication method in which the WEP default key is used. A wireless device sends a frame to the AP and the AP sends back a framethat contains a block of text known as the challenge text. The wireless device must encrypt the text with the default key and return it to the AP. The AP will then decrypt what was returned to see if it matches the original challenge text. If it does, the device is authenticated and allowed to become part of the network (known as association). Shared key authentication is based upon the fact that only pre-approved wireless devices are given the shared key.

Computer Science & Information Technology

You might also like to view...

Animated GIF files move only in ____ views.

A. Slide Show and Reading B. Normal and Slide Sorter C. Slide Show and Normal D. Slide Sorter and Slide Show

Computer Science & Information Technology

To save a new document for the first time, you can click the Save button on the Quick Access Toolbar.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Web pages are displayed by ____________________ whose job it is to locate and display Web information.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The modernist movement of the late nineteenth and twentieth centuries influenced the design principles in use today.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology