A network administrator is implementing a wireless honeypot to detect wireless breach attempts.
The honeypot must implement weak encryption to lure malicious users into easily breaking into the
network. Which of the following should the network administrator implement on the WAP?
A.
WPA
B.
WPA2
C.
WEP
D.
VPN
Explanation:
Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks.
Introduced as part of the original 802.11 standard ratified in September 1999, its intention was to
provide data confidentiality comparable to that of a traditional wired network.WEP, recognizable by
the key of 10 or 26 hexadecimal digits, is widely in use and is often the first security choice
presented to users by router configuration tools