New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 212-81 Exam - Topic 14 Question 28 Discussion

Actual exam question for Eccouncil's 212-81 exam
Question #: 28
Topic #: 14
[All 212-81 Questions]

In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.

Which Algorithm is this referring to?

Show Suggested Answer Hide Answer
Suggested Answer: A

Wired Equivalent Privacy (WEP)

https://en.wikipedia.org/wiki/Wired_Equivalent_Privacy#Weak_security

In 2007, Erik Tews, Andrei Pychkine, and Ralf-Philipp Weinmann were able to extend Klein's 2005 attack and optimize it for usage against WEP. With the new attack it is possible to recover a 104-bit WEP key with probability 50% using only 40,000 captured packets. For 60,000 available data packets, the success probability is about 80% and for 85,000 data packets about 95%. Using active techniques like deauth and ARP re-injection, 40,000 packets can be captured in less than one minute under good conditions. The actual computation takes about 3 seconds and 3 MB of main memory on a Pentium-M 1.7 GHz and can additionally be optimized for devices with slower CPUs. The same attack can be used for 40-bit keys with an even higher success probability.


Contribute your Thoughts:

0/2000 characters
Carey
3 months ago
No way, WEP was the worst of the bunch!
upvoted 0 times
...
Blair
3 months ago
I thought WPA was also vulnerable?
upvoted 0 times
...
Ammie
3 months ago
Yup, WEP got totally owned back then.
upvoted 0 times
...
Lorean
4 months ago
Wait, are we sure it was just WEP?
upvoted 0 times
...
Ardella
4 months ago
Definitely WEP, it was super insecure.
upvoted 0 times
...
Junita
4 months ago
I’m confused between WEP and WPA. I know WEP was outdated, but I can't remember the details clearly.
upvoted 0 times
...
Casie
4 months ago
I recall WEP being the one that had major vulnerabilities. It was mentioned in a case study we did on TJ Maxx.
upvoted 0 times
...
Artie
4 months ago
I'm not entirely sure, but I feel like it could also be WPA. Didn't we practice a question about that?
upvoted 0 times
...
Aja
5 months ago
I think this is about WEP, right? I remember studying how it was easily cracked.
upvoted 0 times
...
Milly
5 months ago
Okay, I've got it! The question says the algorithm was "rendered useless" in 2007, which means it's referring to the older WEP protocol, not the more secure WPA or WPA2. I'm confident the answer is A.
upvoted 0 times
...
Tracey
5 months ago
I'm not entirely sure about this one. The details about wardriving and data theft make me think it could be WPA or WPA2 as well. I'll have to review my notes to see if I can spot any other clues that might help me decide.
upvoted 0 times
...
Bok
5 months ago
Ah, I remember learning about this in class. WEP was the original wireless encryption standard, but it had some major vulnerabilities that allowed attackers to crack the encryption key. The answer has to be A - Wired Equivalent Privacy (WEP).
upvoted 0 times
...
Roxanne
5 months ago
Hmm, I'm a bit confused. The question mentions a "wireless security algorithm" being rendered useless, but it doesn't specify if it's referring to the encryption protocol or the authentication method. I'll have to think this through carefully.
upvoted 0 times
...
Alyce
5 months ago
This one seems pretty straightforward. The description of the security flaw and the TJ Maxx incident points to WEP as the answer.
upvoted 0 times
...
Valentin
5 months ago
Hmm, I'm a little unsure about this one. The options seem similar, and I want to make sure I choose the right course of action for the auditor. I'll need to think through the implications of each choice.
upvoted 0 times
...
Brittani
5 months ago
This seems straightforward. Phantom needs to communicate with the Splunk Cloud instance, so the ports that need to be opened are the standard Splunk web interface port (8000) and the Splunk REST API port (8088). I'll go with option A.
upvoted 0 times
...
Maile
5 months ago
I'm stuck between 225 F and 200 F, I just can't remember which one is correct.
upvoted 0 times
...
Lennie
2 years ago
I remember studying about this in my security class. It's definitely WPANina.
upvoted 0 times
...
Ryan
2 years ago
I agree with user Nina, WPANina is the correct answer here.
upvoted 0 times
...
Nina
2 years ago
No, I believe it is WPANina because of its vulnerability to packet capturing.
upvoted 0 times
...
Yuki
2 years ago
I think the algorithm mentioned in the question is WEP.
upvoted 0 times
...
Kyoko
2 years ago
I disagree, WPAKanisha was the one that replaced WEP because of its security vulnerabilities.
upvoted 0 times
...
Stefania
2 years ago
I feel like the answer might actually be WPA.
upvoted 0 times
...
Kanisha
2 years ago
I agree, WEP was definitely the algorithm that was easily hacked in Kanisha007.
upvoted 0 times
...
Corazon
2 years ago
I think the algorithm referred to in the question is WEP.
upvoted 0 times
...

Save Cancel