What is considered to be one of the biggest weaknesses of WEP?

A. 24-bit initialization vector
B. RC4 encryption
C. 128-bit key
D. Kerberos authentication

Answer: A

Computer Science & Information Technology

You might also like to view...

A ______ is a numeric variable used for counting something, such as the number of times to execute a loop.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The binary search algorithm in the text makes recursive calls on subarrays of the array passed to the algorithm. The range passed to the search function is first to last. The search algorithm makes recursive calls on the left or right subarray that target will be in, if the target is present. What are the left and right ends of the right subarray?

a) Last , mid – 1 b) last , mid + 1 c) mid – 1, last d) mid + 1, last e) last, mid

Computer Science & Information Technology