For post-authentication communication with an access point, the client in 802.11i PSK
mode will ________ for subsequent communication.
A) always use the same preshared key each time it is connected
B) always use the same session key each time it is connected
C) both A and B
D) neither A nor B
The attack on GHOSTNET began with ________.
A) a wireless vulnerability
B) a social engineering attack
C) malicious mobile code
D) an insider attack
A(n) ________ must find the best-matching row in its ________ table by comparing
multiple row matches.
A) Ethernet switch, switching
B) router, routing