List of questions
Related questions
Question 33 - CISSP discussion
Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?
A.
WEP uses a small range Initialization Vector (IV)
B.
WEP uses Message Digest 5 (MD5)
C.
WEP uses Diffie-Hellman
D.
WEP does not use any Initialization Vector (IV)
Your answer:
0 comments
Sorted by
Leave a comment first