The Wired Equivalent Privacy standard had what significant disadvantage?

a. It did not allow the use of a password for access to the network.
b. It provided no encryption for traffic sent over the air.
c. It used a shared encryption key for all clients, and the key might never change.
d. It only encrypted the initial connection authentication, but did not encrypt subsequent traffic.


ANSWER: c

Computer Science & Information Technology

You might also like to view...

Once a presentation is complete, the designer can protect the file so no one can open it without a user name. ? _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

UML diagrams provide a visual representation of the software so that each use case/misuse case can be broken down and analyzed for common secure design patterns and resuable components.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is a valid header for a procedure that receives a copy of the value stored in a String variable?

Private Sub DisplayName(ByContents strName As String) Private Sub DisplayName(ByValue strName As String) Private Sub DisplayName ByVal(strName As String) None of the above

Computer Science & Information Technology

Human Resources suspects an employee is accessing the employee salary database. The administrator is asked to find out who it is. In order to complete this task, which of the following is a security control that should be in place?

A. Shared accounts should be prohibited. B. Account lockout should be enabled C. Privileges should be assigned to groups rather than individuals D. Time of day restrictions should be in use

Computer Science & Information Technology