What were three weaknesses in WEP identified by university studies?
What will be an ideal response?
The RC4 pseudo-random number generator (PRNG) is not properly implemented.
Initialization vector (IV) keys are reused.
WEP does not prevent passive or active man-in-the-middle attacks.
You might also like to view...
A direct access file is also known as a(n) __________access file.
Fill in the blank(s) with the appropriate word(s).
Which of the following is a prerequisite for performing a live migration?
A. the destination host must be identical to the source B. the VM must be assigned at least 4 GB RAM C. the VM must be configured with high availability D. the VM must be using a locally stored .vhd for the system disk
A(n) ____________________ is a software package or template that describes the characteristics of similar objects.
Fill in the blank(s) with the appropriate word(s).
Which of the following activities should be completed in order to detect anomalies on a network?
A. Incident management B. Change management C. User permissions reviews D. Log reviews