Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GSLC Topic 5 Question 55 Discussion

Actual exam question for GIAC's GSLC exam
Question #: 55
Topic #: 5
[All GSLC Questions]

Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WLANs). It has two components, authentication and encryption. It provides security equivalent to wired networks for wireless networks. WEP encrypts data on a wireless network by using a fixed secret key. Which of the following statements are true about WEP?

Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Edna
2 months ago
I heard WEP is so weak, you could crack it with a calculator and a piece of chewing gum. Talk about security through obscurity!
upvoted 0 times
Stevie
20 days ago
D) The Initialization Vector (IV) field of WEP is only 24 bits long.
upvoted 0 times
...
Azalee
27 days ago
B) Automated tools such as AirSnort are available for discovering WEP keys.
upvoted 0 times
...
Dominga
1 months ago
A) WEP uses the RC4 encryption algorithm.
upvoted 0 times
...
...
Chantay
2 months ago
C is definitely false. WEP is much weaker than Wi-Fi Protected Access (WPA) or WPA2, which provide much better security.
upvoted 0 times
Antonio
28 days ago
D) The Initialization Vector (IV) field of WEP is only 24 bits long.
upvoted 0 times
...
Delsie
1 months ago
B) Automated tools such as AirSnort are available for discovering WEP keys.
upvoted 0 times
...
Haley
1 months ago
A) WEP uses the RC4 encryption algorithm.
upvoted 0 times
...
...
Sabrina
2 months ago
A and D are correct, WEP uses the RC4 algorithm and has a short IV field, making it vulnerable to attacks. B is also true, as tools like AirSnort can be used to crack WEP keys.
upvoted 0 times
Virgie
1 months ago
Yes, B is also true. Tools like AirSnort can be used to crack WEP keys.
upvoted 0 times
...
Cassi
2 months ago
I think A and D are correct. WEP uses the RC4 algorithm and has a short IV field.
upvoted 0 times
...
...
Aliza
3 months ago
I'm not sure about C) and D), but I think A) and B) are definitely true. WEP has some vulnerabilities that make it less secure than other protocols.
upvoted 0 times
...
Dylan
3 months ago
I agree with Heike, A) and B) are correct. WEP does use the RC4 encryption algorithm and tools like AirSnort can discover WEP keys.
upvoted 0 times
...
Heike
3 months ago
I think A) and B) are true about WEP.
upvoted 0 times
...

Save Cancel