Exam4Training

Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?

Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?
A . WEP uses a small range Initialization Vector (IV)
B . WEP uses Message Digest 5 (MD5)
C . WEP uses Diffie-Hellman
D . WEP does not use any Initialization Vector (IV)

Answer: A

Explanation:

Reference: http://www.dummies.com/programming/networking/understanding-wep-weaknesses/

Latest CISSP Dumps Valid Version with 981 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version