What steps does Shared Key Authentication involve for a client to associate with the AP?
• The client sends a probe request to the APs. • The APs send back probe responses. • The client evaluates the AP responses and selects the best AP. • The client sends an authentication request to the AP. • The AP sends an authentication response that contains the unencrypted challenge text. • The client encrypts the challenge text with the WEP key and sends the text to the AP. • The AP compares the unencrypted challenge text with the encrypted challenge text. If the authentication can decrypt and retrieve the original challenge text, authentication is successful. Shared Key Authentication uses WEP encryption during the client association process.