Which of the following describes a weakness of Wired Equivalent Privacy (WEP)?
A.
MAC address filtering
B.
The use of one-time pads to encrypt data
C.
The use of weak keys during the encryption process
D.
The use of symmetric-key encryption, which is never appropriate when securing network-based
connections
Explanation: