In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the
passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through
a technique known as wardriving.
Which Algorithm is this referring to?
A.
Wired Equivalent Privacy (WEP)
B.
Wi-Fi Protected Access (WPA)
C.
Wi-Fi Protected Access 2 (WPA2)
D.
Temporal Key Integrity Protocol (TKIP)
Explanation:
WEP is the currently most used protocol for securing 802.11 networks, also called wireless lans or wlans. In
2007, a new attack on WEP, the PTW attack, was discovered, which allows an attacker to recover the secret
key in less than 60 seconds in some cases.
Note: Wardriving is the act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a
portable computer, smartphone or personal digital assistant (PDA).
https://events.ccc.de/camp/2007/Fahrplan/events/1943.en.html