188k views
2 votes
In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving. Which Algorithm is this referring to?

A. Wired Equivalent Privacy (WEP)
B. Wi-Fi Protected Access (WPA)
C. Wi-Fi Protected Access 2 (WPA2)
D. Temporal Key Integrity Protocol (TKIP)

2 Answers

4 votes

Answer:

The answer to this question is the option "A".

Explanation:

The WEP (Wired Equivalent Privacy) is a security protocol suite. Which is defined in the IEEE(Institute of Electrical and Electronics Engineers) Wi-Fi (Wireless Fidelity) standard 802.11b. This project invented to produce a wireless local area network (WLAN) with a level of security and secrecy. Which is normally demanded from a wired LAN. In WEP two devices need to share their password to communicate with one or more devices. The difficulty with WEP includes the use of a 24-bit initialization vector, that will sometimes repeat itself during transmission. So the answer to this question is WEP.

User Graykos
by
7.5k points
4 votes

Answer:

The correct answer to the following question is option A. Wired Equivalent Privacy (WEP).

Step-by-step explanation:

WEP (Wired Equivalent Privacy) is the security protocol which is specified in IEEE Wi-Fi (Wireless Fidelity) standard 802.11b, which is designed for providing a WLAN (Wireless Local Area Network) with the level of privacy and security.

Wardriving is act of searching for the WI-FI (Wireless Fidelity) networks by the person in the moving vehicle by using PDA (Personal Digital Assistant), smartphones or portable computer.

User Evelie
by
7.6k points

Related questions

asked Jun 20, 2024 181k views
LC Yoong asked Jun 20, 2024
by LC Yoong
8.8k points
1 answer
0 votes
181k views
1 answer
1 vote
91.5k views
asked Nov 12, 2024 218k views
Infomofo asked Nov 12, 2024
by Infomofo
8.6k points
1 answer
5 votes
218k views