One of the ways to protect wireless traffic from prying eyes is by using a _____ key, where all entities share the same key, such as a password or pass phrase to secure the traffic between entities.

Q&A Education