Which of the following are weaknesses in WEP that allow it to be easily cracked? (Select all that apply.)

A. size of the encryption key
B. use of AES
C. use of 802.1X
D. faulty implementation of the RC4 protocol
E. both A and D


Answer: E

Computer Science & Information Technology

You might also like to view...

If you have an overly confident user on the phone, what is a good practice?

A. compliment the user's knowledge, insight, and experience B. keep the conversation moving to place the user at a disadvantage C. point out the customer's mistakes to shake their confidence D. use technical jargon that matches or exceeds the customer's use of jargon

Computer Science & Information Technology

Which of the following is NOT considered a chart element?

A) Background B) Plot area C) Legend D) Chart area

Computer Science & Information Technology

A(n) ____________________ object is used to allow users to select from a list or enter data as if using a text box.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The ____________________ autoglobal can be used to access the result from form data sent with either the get or post methods.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology