What key lengths does WEP use according to the source material?

Study for the EC-Council Certified Security Specialist (ECSS) Exam. Prepare with multiple choice questions, detailed explanations, and key insights to boost your confidence. Ace the exam now!

Multiple Choice

What key lengths does WEP use according to the source material?

Explanation:
WEP uses RC4 with a seed built from a secret key plus a per-frame initialization vector. There are two secret-key sizes supported: a shorter one and a longer one. Some source materials present these options in a paired form, which is why the answer matches that two-number notation. The initialization vector is twenty-four bits long and is appended to the secret key to form the RC4 seed, so the overall keying material reflects both sizes. The other options describe lengths that don’t align with how WEP’s secret keys and the IV are actually used.

WEP uses RC4 with a seed built from a secret key plus a per-frame initialization vector. There are two secret-key sizes supported: a shorter one and a longer one. Some source materials present these options in a paired form, which is why the answer matches that two-number notation. The initialization vector is twenty-four bits long and is appended to the secret key to form the RC4 seed, so the overall keying material reflects both sizes. The other options describe lengths that don’t align with how WEP’s secret keys and the IV are actually used.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy