If authentication is performed by IEEE 802.1x using the WPA or WPA2 Enterprise model, the distribution of the ____, from which all other keys are formed, is done by the authentication server.
A) pairwise master key (PMK)
B) master key (MK)
C) pairwise transient key (PTK)
D) key confirmation key (KCK)
Correct Answer:
Verified
Q2: A _ deployment uses local authentication with
Q3: _ measures the resources a user consumes
Q4: LEAP is not vulnerable to dictionary attack
Q5: The X.500 standard defines a protocol for
Q6: Wireless authentication first requires the wireless device-not
Q8: _ is an industry standard protocol specification
Q9: With _ deployment, RADIUS servers are located
Q10: The MKs are used for access point
Q11: _ allows a RADIUS server to authenticate
Q12: _ uses the unique human characteristics of
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents