Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?

Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?
A . WEP uses a small range Initialization Vector (IV)
B . WEP uses Message Digest 5 (MD5)
C . WEP uses Diffie-Hellman
D . WEP does not use any Initialization Vector (IV)

Answer: A

Explanation:

Reference: http://www.dummies.com/programming/networking/understanding-wep-weaknesses/

Latest CISSP Dumps Valid Version with 981 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments