The weakness of WEP is that __________.
a. it requires the use of an enhanced access point (EAP) for it to function properly
b. it is costly to implement
c. the encryption algorithm has been broken by attackers
d. the initialization vectors (IVs) are repeated
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here