Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Cybersecurity-Audit-Certificate Exam - Topic 4 Question 51 Discussion

Actual exam question for Isaca's Cybersecurity-Audit-Certificate exam
Question #: 51
Topic #: 4
[All Cybersecurity-Audit-Certificate Questions]

Which of the following is a weakness associated with the use of symmetric, private keys in wired equivalent privacy (WEP) encryption?

Show Suggested Answer Hide Answer
Suggested Answer: C

The use of symmetric, private keys in WEP encryption is associated with several weaknesses, one of which is that the keys often remain unchanged on networks for extended periods. This can lead to security vulnerabilities because if an attacker manages to compromise a key, they can potentially gain access to the network and decrypt data for as long as the key remains unchanged.


Contribute your Thoughts:

0/2000 characters
Gladys
24 hours ago
I disagree, A is more of a concern. Keys should change regularly!
upvoted 0 times
...
Tegan
6 days ago
C is definitely a weakness. Keys don’t change often enough.
upvoted 0 times
...
Margo
11 days ago
I thought keys being stored in the cloud was a bigger issue, but now I'm leaning towards C as the weakness in WEP.
upvoted 0 times
...
Herminia
16 days ago
I practiced a similar question, and I recall that WEP has issues with key management. So, C sounds familiar.
upvoted 0 times
...
Tesha
22 days ago
I'm not entirely sure, but I remember something about keys being static in WEP. Maybe that's why C is the right answer?
upvoted 0 times
...
Denise
27 days ago
I think option C makes sense because WEP keys don't change often, which could be a security risk.
upvoted 0 times
...

Save Cancel