| Exam 200-355 | Question id=2500 | Configuration of Client Connectivity |
Which statement describes a security weakness of a WPA2 with a PSK?
| A. |
The compromised key can be used for another connection. | |
| B. |
The key can be eavesdropped from the wireless medium. | |
| C. |
The key can be recreated from a few eavesdropped frames. | |
| D. |
The key is not case-sensitive and is vulnerable to compromise by brute-force methods. |
WPA2-Enterprise is (in my opinion) considerably more secure than PSK.