Certified Information Systems Security Professional – CISSP – Question089

Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?

A.
WEP uses a small range Initialization Vector (IV)
B. WEP uses Message Digest 5 (MD5)
C. WEP uses Diffie-Hellman
D. WEP does not use any Initialization Vector (IV)