Describe the steps used by WPA2 to authenticate a user.
What will be an ideal response?
The access point sends an EAP message requesting the user’s identity. The user (client computer) returns the identity information that is sent by the access point to an authentication server. The server will then accept or reject the
user’s request to join the network. If the client is authorized, the access point will change the user’s (client’s) state to authorized.
You might also like to view...
In PowerPoint, the icon of a paint brush that appears to the right of a pasted chart is the icon for the ________ button
A) Chart Filters B) Chart Styles C) Chart Format D) Chart Elements
What password security option ensures that a user must choose new passwords when a password change is required?
A. Maximum password age B. Minimum password age C. Passwords must meet complexity requirements D. Enforce password history