Which of the following describes a weakness of Wired Equivalent Privacy (WEP)?

Which of the following describes a weakness of Wired Equivalent Privacy (WEP)?

Which of the following describes a weakness of Wired Equivalent Privacy (WEP)?

A.
MAC address filtering

B.
The use of one-time pads to encrypt data

C.
The use of weak keys during the encryption process

D.
The use of symmetric-key encryption, which is never appropriate when securing network-based
connections

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *