ISC Certified Information Systems Security Professional (CISSP) CISSP Question # 24 Topic 3 Discussion

ISC Certified Information Systems Security Professional (CISSP) CISSP Question # 24 Topic 3 Discussion

CISSP Exam Topic 3 Question 24 Discussion:
Question #: 24
Topic #: 3

Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?


A.

WEP uses a small range Initialization Vector (IV)


B.

WEP uses Message Digest 5 (MD5)


C.

WEP uses Diffie-Hellman


D.

WEP does not use any Initialization Vector (IV)


Get Premium CISSP Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.