What were three weaknesses in WEP identified by university studies?

What will be an ideal response?


The RC4 pseudo-random number generator (PRNG) is not properly implemented.
Initialization vector (IV) keys are reused.
WEP does not prevent passive or active man-in-the-middle attacks.

Computer Science & Information Technology

You might also like to view...

A direct access file is also known as a(n) __________access file.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is a prerequisite for performing a live migration?

A. the destination host must be identical to the source B. the VM must be assigned at least 4 GB RAM C. the VM must be configured with high availability D. the VM must be using a locally stored .vhd for the system disk

Computer Science & Information Technology

A(n) ____________________ is a software package or template that describes the characteristics of similar objects.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following activities should be completed in order to detect anomalies on a network?

A. Incident management B. Change management C. User permissions reviews D. Log reviews

Computer Science & Information Technology