There are two types of keys: ________ used for communication between a STA and an AP and group keys used for multicast communication.
What will be an ideal response?
Question 2
All requirements derived from reverse engineering must be verified by consulting ________.
A) stakeholders
B) users
C) experts
D) all of the above