Which the 3rd phase of operation in the IEEE 802.11i Protocol?
(a) Protected Data Transfer
(b) Discovery
(c) Authentication
(d) Key Management
I had been asked this question by my college professor while I was bunking the class.
Asked question is from IEEE 802.11i WLAN Security in portion Wireless Network Security and Network Security Overview of Cryptograph & Network Security