WIRELESS NETWORKS AND MOBILE IP
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
It functions only on specific brands of APs.
|
|
Its usage creates a detectable pattern.
|
|
It slows down a WLAN from 104 Mbps to 16 Mbps.
|
|
Initialization vectors (IVs) are difficult for users to manage.
|
Detailed explanation-1: -The weakness of Wired Equivalent Privacy (WEP) is because of the small value of IVs. Within a short period of time all keys are reused. This weakness of Wired Equivalent Privacy (WEP) is the same for different encryption levels, because all use the 24 bit IV.
Detailed explanation-2: -The basic problem with WEP is that it uses a cipher not suitable for the environment it operates in. WEP uses a stream-cipher known as RC4 in synchronous mode for encrypting data packets.
Detailed explanation-3: -Wired Equivalent Privacy (WEP) used to be the standard form of encryption, but it’s no longer secure, because computing power has improved and hackers can now crack it easily. WEP security encrypts with a static key-one of the biggest reasons it’s no longer considered secure.