nerdexam
CompTIACompTIA

220-1102 · Question #823

220-1102 Question #823: Real Exam Question with Answer & Explanation

The correct answer is C: Vulnerability to key-cracking attacks. {"question_number": 8, "explanation": "The correct answer is C. Vulnerability to key-cracking attacks. WEP (Wired Equivalent Privacy) uses a static, weak RC4 encryption implementation with a flawed IV (Initialization Vector) scheme. An attacker can passively capture enough wirele

Security

Question

Which of the following is the most significant drawback of using the WEP protocol for wireless security?

Options

  • AComplex configuration process
  • BSlow data transfer speed
  • CVulnerability to key-cracking attacks
  • DIncompatibility with older devices

Explanation

{"question_number": 8, "explanation": "The correct answer is C. Vulnerability to key-cracking attacks. WEP (Wired Equivalent Privacy) uses a static, weak RC4 encryption implementation with a flawed IV (Initialization Vector) scheme. An attacker can passively capture enough wireless traffic and use readily available tools to crack the WEP key in minutes, regardless of key length. This fundamental cryptographic weakness is why WEP is considered obsolete and should not be used. WEP is not particularly complex to configure (A), does not have significantly slower speeds than its contemporaries (B), and is actually compatible with older devices (D) - compatibility was one of its design goals.", "generated_by": "claude-sonnet", "llm_judge_score": 4}

Topics

#WEP#Wireless Security#Network Security#Encryption Vulnerabilities

Community Discussion

No community discussion yet for this question.

Full 220-1102 PracticeBrowse All 220-1102 Questions