Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Exam CISSP All Questions
Exam CISSP All Questions

View all questions & answers for the CISSP exam

ISC 2 Credentials CISSP Question # 148 Topic 15 Discussion

CISSP Exam Topic 15 Question 148 Discussion:
Question #: 148
Topic #: 15

Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?


A.

WEP uses a small range Initialization Vector (IV)


B.

WEP uses Message Digest 5 (MD5)


C.

WEP uses Diffie-Hellman


D.

WEP does not use any Initialization Vector (IV)


Get Premium CISSP Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.