Exam 200-355 | Question id=2500 | Configuration of Client Connectivity |
Which statement describes a security weakness of a WPA2 with a PSK?
A. |
The compromised key can be used for another connection. | |
B. |
The key can be eavesdropped from the wireless medium. | |
C. |
The key can be recreated from a few eavesdropped frames. | |
D. |
The key is not case-sensitive and is vulnerable to compromise by brute-force methods. |
WPA2-Enterprise is (in my opinion) considerably more secure than PSK.