ExamGecko
Home Home / ISC / CISSP
Question list
Search
Search

Question 33 - CISSP discussion

Report
Export

Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?

A.
WEP uses a small range Initialization Vector (IV)
Answers
A.
WEP uses a small range Initialization Vector (IV)
B.
WEP uses Message Digest 5 (MD5)
Answers
B.
WEP uses Message Digest 5 (MD5)
C.
WEP uses Diffie-Hellman
Answers
C.
WEP uses Diffie-Hellman
D.
WEP does not use any Initialization Vector (IV)
Answers
D.
WEP does not use any Initialization Vector (IV)
Suggested answer: A
asked 18/09/2024
Vladimir Kosintsov
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first