Which five options are results of that exchange being used on a controller-based network?

Posted by: Pdfprep Category: 300-370 Tags: , ,

When the enterprise-based authentication method is used for WPA2, a bidirectional handshake exchange occurs between the client and the authenticator.

Which five options are results of that exchange being used on a controller-based network? (Choose five.)
A . a bidirectional exchange of a nonce used for key generation
B . binding of a Pairwise Master Key at the client and the controller
C . creation of the Pairwise Transient Key
D . distribution of the Group Transient Key
E . distribution of the Pairwise Master key for caching at the access point
F . proof that each side is alive

Answer: ABCDF

Explanation:

Regardless of whether WPA or WPA2 is used during the initial connection between the station and the AP, the two agree on common security requirements.

Following that agreement, a series of important key related activities occur in this specific order

Leave a Reply

Your email address will not be published.