In WEP, the ____ is a 24-bit value that changes each time a packet is encrypted.

A. initialization vector (IV)
B. pseudo-random number generator (PRNG)
C. integrity check value (ICV)
D. RC4


Answer: A

Computer Science & Information Technology

You might also like to view...

A website may put ________ on your computer when you visit it

A) spyware B) a cookie C) a packet D) malware

Computer Science & Information Technology

What protocol is used by the ping command?

a. IGMP b. PIM c. ICMP d. RTP

Computer Science & Information Technology

Define Control Objectives for Information and Related Technology (COBIT). What are the principles proposed by COBIT that guide the governance of information technology (IT)?

What will be an ideal response?

Computer Science & Information Technology

Write a line for the /etc/fstab file that mounts the /dev/sdb1 ext4 filesystem on /extra with the following characteristics: The filesystem will not be mounted automatically when the system boots, and anyone can mount and unmount the filesystem.

What will be an ideal response?

Computer Science & Information Technology