ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 17 - 112-51 discussion

Report
Export

Below are the various steps involved in establishing a network connection using the shared key authentication process.

1.The AP sends a challenge text to the station.

2.The station connects to the network.

3.The station encrypts the challenge text using its configured 128-bit key and sends the encrypted text to the AP.

4.The station sends an authentication frame to the AP.

5.The AP uses its configured WEP key to decrypt the encrypted text and compares it with the original challenge text.

What is the correct sequence of steps involved in establishing a network connection using the shared key authentication process?

A.
4 -- >2 -- >1 -- >3 -- >5
Answers
A.
4 -- >2 -- >1 -- >3 -- >5
B.
4 -- >1 -- >3 -- >5 -- >2
Answers
B.
4 -- >1 -- >3 -- >5 -- >2
C.
2 -- >4 -- >5 -- >1 -- >3
Answers
C.
2 -- >4 -- >5 -- >1 -- >3
D.
4 -- >5 -- >3 -- >2 -- >1
Answers
D.
4 -- >5 -- >3 -- >2 -- >1
Suggested answer: B

Explanation:

The correct sequence of steps involved in establishing a network connection using the shared key authentication process is 4 -> 1 -> 3 -> 5 -> 2. This is based on the following description of the shared key authentication process from the Network Defense Essentials courseware:

The station sends an authentication frame to the AP, indicating that it wants to use shared key authentication.

The AP responds with an authentication frame containing a challenge text, which is a random string of bits.

The station encrypts the challenge text using its configured WEP key, which is derived from the shared secret key (password) that is also known by the AP. The station sends the encrypted text back to the AP in another authentication frame.

The AP decrypts the encrypted text using its configured WEP key and compares it with the original challenge text. If they match, the AP sends a positive authentication response to the station. If they do not match, the AP sends a negative authentication response to the station.

The station connects to the network if the authentication is successful.

Network Defense Essentials Courseware, EC-Council, 2020, pp. 3-18 to 3-19

Shared Key Authentication - Techopedia, Techopedia, June 15, 2017

asked 18/09/2024
Jean-Bosco Muganza
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first