An administrator has received a recommendation against deploying WEP as a wireless encryption protection scheme. Which of the following is MOST likely the reason?

A. WEP's IV is too small.
B. WEP uses RC4 which is easily accessible and not secure.
C. WEP uses plain text.
D. WEP is not well supported.


Answer: A. WEP's IV is too small.

Computer Science & Information Technology

You might also like to view...

__________ allows a method to take on many definitions when applied to objects in a hie-rarchy of classes.

Fill in the blank(s) with correct word

Computer Science & Information Technology

Suppose class Child is derived from class Parent that was in turn derived from class GrandParent. This question concerns order of calls to constructors and destructors for these three classes. Declare an object of class Child. We know that Child, Parent and GrandParent constructors are called. In what order are these constructors are called? When the time comes to destroy the class Child object, we know that Child, Parent and GrandParent destructors are called. In what order are these destructor called?

What will be an ideal response?

Computer Science & Information Technology

____ appears as a color fringe along the edges of objects caused by the lens focusing on different colors of light.

a. Barrel Distortion b. Chromatic Aberration c. Pincushion Distortion d. Keystone Distortion

Computer Science & Information Technology

____ video places the entire video in the Flash document, similar to the way that bitmaps are imported and become part of the document.

A. Imported B. Cohesive C. Included D. Embedded

Computer Science & Information Technology