The purpose of the discovery phase in the ___________ is for a STA and an AP to recognize each other, agree on a set of security capabilities, and establish an association for future communication using those security capabilities.
A. WPA
B. RSN
C. TKIP
D. WAE
B. RSN
Computer Science & Information Technology
You might also like to view...
To delete a building block, you would need to use the ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
In an article with the source "International Business Machines," to cite the author you would
A) in the Author box, simply state "No Author Given". B) select the Corporate Author check box and use "International Business Machines". C) enter "Machines, International Business" as the author. D) select the Corporate Author check box and use "Machines, International Business".
Computer Science & Information Technology