After authentication in 80.11i PSK mode, a wireless client communicates with the
access point via a(n) ________ key.
The ________ standard was created to prevent attackers from walking in and simply
plugging a computer into a wall jack and therefore accessing the network.
A) Ethernet firewall
An MTSO ________.
A) controls cellsites in a cellular system
B) links mobile users to wired telephone customers