PrepAway - Latest Free Exam Questions & Answers

Which of the following describes why the algorithm that was chosen by the WEP working group was not the best c

WEP has a long list of security vulnerabilities. Which of the following describes why the algorithm that was chosen by the WEP working group was not the best choice?

PrepAway - Latest Free Exam Questions & Answers

A.
It�s a stream cipher, which has an inherent deficiency in integrity.

B.
It�s a stream cipher, which has an inherent deficiency in key size.

C.
It�s a stream cipher, which has an inherent deficiency in being vulnerable to man-in-the-middle attacks.

D.
It�s a stream cipher, which has an inherent deficiency in being vulnerable to spoofing attacks.

Explanation:
Stream ciphers, by default, have a deficiency in that someone can
capture a message and modify the bits without the receiver being able to identify
it. This is because the message will decrypt properly.

2 Comments on “Which of the following describes why the algorithm that was chosen by the WEP working group was not the best c


Leave a Reply