When the enterprise-based authentication method is used for WPA2, a bidirectional handshake exchange occurs between the client and the authenticator.
Which five options are results of that exchange being used on a controller-based network? (Choose five.)
A . a bidirectional exchange of a nonce used for key generation
B . binding of a Pairwise Master Key at the client and the controller
C . creation of the Pairwise Transient Key
D . distribution of the Group Transient Key
E . distribution of the Pairwise Master key for caching at the access point
F . proof that each side is alive
Answer: ABCDF
Explanation:
Regardless of whether WPA or WPA2 is used during the initial connection between the station and the AP, the two agree on common security requirements.
Following that agreement, a series of important key related activities occur in this specific order