Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?
Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?
A . WEP uses a small range Initialization Vector (IV)
B . WEP uses Message Digest 5 (MD5)
C . WEP uses Diffie-Hellman
D . WEP does not use any Initialization Vector (IV)
Answer: A
Explanation:
Reference: http://www.dummies.com/programming/networking/understanding-wep-weaknesses/
Latest CISSP Dumps Valid Version with 981 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments