When setting up a wireless network, an adm
inistrator enters a pre-shared key for security. Which of the following is true?
A. The key entered is a symmetric key used to encrypt the wireless data.
B. The key entered is a hash that is used to prove the integrity of the wireless data.
C. The key
entered is based on the Diffie-Hellman method.
D. The key is an RSA key used to encrypt the wireless data.