List of questions
Related questions
Question 5 - 112-51 discussion
Jessica, a user, wanted to access the Internet from her laptop and therefore sends a connection request to the access point. To identify the wireless client, the access point forwarded that request to a RADIUS server.
The RADIUS server transmitted authentication keys to both the access point and Jessica's laptop. This key helps the access point identify a particular wireless client.
Identify the authentication method demonstrated in the above scenario.
A.
Shared key authentication
B.
Null authentication
C.
Open system authentication
D.
Centralized authentication
Your answer:
0 comments
Sorted by
Leave a comment first