What are the two authentication methods provided by early 802.11 standards?

What will be an ideal response?

shared-key authentication
open system authentication

Computer Science & Information Technology

You might also like to view...

When you are sending one email to all of your friends in your address book, you should use the ________ field to keep their addresses private

A) To: B) Cc: C) Pcc: D) Bcc:

Computer Science & Information Technology

Which of the following is NOT a video streaming service?

A) Netflix B) Flickr C) Hulu D) Amazon Prime

Computer Science & Information Technology