ISC Exam Questions

Which of the following factors contrib…

Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?

A. WEP uses a small range Initialization Vector (IV)

B. WEP uses Message Digest 5 (MD5)

C. WEP uses Diffie-Hellman

D. WEP does not use any Initialization Vector (IV)

Reference: http://www.dummies.com/programming/networking/understanding-wep-weaknesses/