Which of the following is a concern when encrypting wireless data with WEP?
WEP displays the plain text entire key when wireless packet captures are reassembled
WEP implements weak initialization vectors for key transmission
WEP uses a very weak encryption algorithm
WEP allows for only four pre-shared keys to be configured
The initialization vector (IV) that WEP uses for encryption is 24-bit, which is quite weak and means that IVs are
reused with the same key. By examining the repeating result, it was easy for attackers to crack the WEP secret
key. This is known as an IV attack.