In WEP, the ____ is a 24-bit value that changes each time a packet is encrypted.
A. initialization vector (IV)
B. pseudo-random number generator (PRNG)
C. integrity check value (ICV)
D. RC4
Answer: A
You might also like to view...
A website may put ________ on your computer when you visit it
A) spyware B) a cookie C) a packet D) malware
What protocol is used by the ping command?
a. IGMP b. PIM c. ICMP d. RTP
Define Control Objectives for Information and Related Technology (COBIT). What are the principles proposed by COBIT that guide the governance of information technology (IT)?
What will be an ideal response?
Write a line for the /etc/fstab file that mounts the /dev/sdb1 ext4 filesystem on /extra with the following characteristics: The filesystem will not be mounted automatically when the system boots, and anyone can mount and unmount the filesystem.
What will be an ideal response?