Which three statements describe the security weaknesses of WEP? (Choose three.)
A.
Key strength is weak and non-standardized.
B.
The WEP ICV algorithm is not optimal for cryptographic integrity checking.
C.
There is no key distribution mechanism.
D.
Its key rotation mechanism is too predictable.
E.
For integrity, it uses MD5, which has known weaknesses.