Which feature makes competitor products vulnerable to various security attacks?
A.
FIPS 140-2 compliance
B.
support for only the basic Wired Equivalent Privacy
C.
support for Triple Data Encryption Standard, media interface connectors, and other security features
D.
user-based identification