ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 27 - ECSS discussion

Report
Export

Below are the various steps involved in establishing a network connection using the shared key authentication process.

l .The AP sends a challenge text to the station.

2 .The station connects to the network.

3 .The station encrypts the challenge text using its configured 128-bit key and sends the encrypted text to the AP.

4 .The station sends an authentication frame to the AP.

5 .The AP uses its configured WEP key to decrypt the encrypted text and compares it with the original challenge text.

What is the correct sequence of steps involved in establishing a network connection using the shared key authentication process?

A.

2 >4 >3

Answers
A.

2 >4 >3

B.

4--->2--->1--->3--->5

Answers
B.

4--->2--->1--->3--->5

C.

4--->1--->3--->5--->2

Answers
C.

4--->1--->3--->5--->2

D.

4-->5->3->2-->1

Answers
D.

4-->5->3->2-->1

Suggested answer: C

Explanation:

The AP sends a challenge text to the station.

The Access Point (AP) initiates the authentication process by sending a challenge text to the station (client device).

The station connects to the network.

The station (client device) associates with the wireless network by connecting to the AP.

The station encrypts the challenge text using its configured 128-bit key and sends the encrypted text to the AP.

The station encrypts the challenge text using the shared secret key (configured on both the station and the AP).

It then sends the encrypted challenge text back to the AP.

The station sends an authentication frame to the AP.

The station constructs an authentication frame containing the encrypted challenge text.

This frame is sent to the AP for verification.

The AP uses its configured WEP key to decrypt the encrypted text and compares it with the original challenge text.

The AP decrypts the received encrypted challenge text using its configured WEP (Wired Equivalent Privacy) key.

If the decrypted text matches the original challenge text, the station is authenticated successfully.

Therefore, the correct sequence isC. 4--->1--->3--->5--->21. This order ensures that the challenge text is exchanged securely and verified by both the station and the AP during the shared key authentication process.

EC-Council Certified Security Specialist (E|CSS) documents and study guide.

EC-Council Certified Security Specialist (E|CSS) course materials1234

asked 24/10/2024
Pavol Adamcin
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first