Home » Cisco » 300-375 » When a wireless client uses WPA2 AES, which keys are created at the end of the four-way handshake process between the client and the access point?
When a wireless client uses WPA2 AES, which keys are created at the end of the four-way handshake process between the client and the access point?
A. AES key, TKIP key, WEP key
B. AES key, WPA2 key, PMK
C. KCK, KEK, TK
D. KCK, KEK, MIC key
Correct Answer: A
Explanation/Reference:
Explanation: When WPA-PSK or WPA2-PSK is performed via Temporal Key Integrity Protocol (TKIP) or Advanced Encryption Standard (AES) for the encryption, the client must go through the process known as the WPA 4-Way handshake for both the initial association and also when roaming. As previously explained, this is basically the key management process used in order for WPA/WPA2 to derive the encryption keys. However, when PSK is performed, it is also used in order to verify that the client has a valid Pre-Shared Key to join the WLAN.
Reference: http://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/116493-technote-technology-00.html#anc6
Answer is C.
Key Confirmation Key (KCK) – Used during the creation of the Message Integrity Code.
Key Encryption Key (KEK) – Used by the access point during data encryption.
Temporal Key (TK) – Used for the encryption and decryption of unicast packets.
https://www.ins1gn1a.com/understanding-wpa-psk-cracking/
Answer is A
http://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/116493-technote-technology-00.html#anc6
Answer is C
Key encryption key
Key encryption key
Temporal key