Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanisms are true? (Choose two)