100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

C839v5 / D334 Chapter 12 – Wireless Security Knowledge Check (WEP, WPA, TKIP, RC4)|Verified A+ Graded Rationales Latest Updated 2026

Rating
-
Sold
-
Pages
12
Grade
A+
Uploaded on
01-02-2026
Written in
2025/2026

C839v5 / D334 Chapter 12 – Wireless Security Knowledge Check (WEP, WPA, TKIP, RC4)|Verified A+ Graded Rationales Latest Updated 2026 From the list below, select the options that underscore weaknesses in WEP. Select all that apply. - Small value of IV - No IV used - Lack of message tampering identification - No master key used - Small value of IV - Lack of message tampering identification Explanation: WEP is weak from a number of viewpoints including: • Small value of IV. This meant that it repeated within a reasonable time, and the key could then be attacked. • Construction of keys made it susceptible to the weak key attacks (FMS attack). • Lack of protection against message replay. There was no protection against cipher streams being played back over the network. • Lack of message tampering identification. The method did not support the detection of message tampering. • Directly used a master key. The method had no way of updating the keys. The initialization vector used with WEP is _____ bits long? 24 Explanation: Within IEEE 802.11 networks, WEP (Wired Equivalent Protocol), which uses RC4 and a 24-bit IV, could roll-around after a few hours. This method was replaced by TKIP (Temporal Key Integrity Protocol) and which had a 48-bit IV value, and where a session key was used as the seed for the S-box. Select the the weaknesses in WEP from the list below. Select all that apply. - Small value of IV - Susceptibility to Fluhrer, Mantin, Shamir attack - Lack of message tampering identification - Susceptibility to message replay - Small value of IV - Susceptibility to Fluhrer, Mantin, Shamir attack - Lack of message tampering identification - Susceptibility to message replay Explanation: WEP is weak from a number of viewpoints including: • Small value of IV. This meant that it repeated within a reasonable time, and the key could then be attacked. • Construction of keys made it susceptible to the weak key attacks (FMS attack). • Lack of protection against message replay. There was no protection against cipher streams being played back over the network. • Lack of message tampering identification. The method did not support the detection of message tampering. • Directly used a master key. The method had no way of updating the keys. WEP uses the block cipher RC4 configured for operation with 40-bit keys. True or False False Explanation: WEP uses the RC4 stream cipher. With this we have a 24-bit IV and a 40-bit key. WPA uses RC4 with TKIP (Temporal Key Integrity Protocol) for encryption and has a ____-bit IV value. 48 24 40 128 48 Explanation: Within IEEE 802.11 networks, WEP (Wired Equivalent Protocol), uses RC4 and a 24-bit IV, which could roll-around after a few hours. This method was replaced by TKIP (Temporal Key Integrity Protocol) and which had a 48-bit IV value, and where a session key was used as the seed for the S-box. WPA uses RC4 with TKIP (Temporal Key Integrity Protocol) for encryption at ____bits. 48 24 40 128 128 Explanation: Within IEEE 802.11, wi-fi has evolved through the usage of the RC4 stream encryption method. Because of export restrictions, the size of the original key in RC4 was limited to 40 bits (for WEP) and was then increased to 128 bits (TKIP). Wi-Fi Protected Access (WPA) uses ____-bit RC4 with TKIP for encryption.

Show more Read less
Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Course

Document information

Uploaded on
February 1, 2026
Number of pages
12
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

C839v5 / D334 Chapter 12 – Wireless Security
Knowledge Check (WEP, WPA, TKIP, RC4)|Verified A+
Graded Rationales Latest Updated 2026
From the list below, select the options that underscore weaknesses in WEP. Select all that apply.

- Small value of IV
- No IV used
- Lack of message tampering identification
- No master key used

- Small value of IV
- Lack of message tampering identification

Explanation:
WEP is weak from a number of viewpoints including:
• Small value of IV. This meant that it repeated within a reasonable time,
and the key could then be attacked.
• Construction of keys made it susceptible to the weak key attacks (FMS
attack).
• Lack of protection against message replay. There was no protection
against cipher streams being played back over the network.
• Lack of message tampering identification. The method did not support
the detection of message tampering.
• Directly used a master key. The method had no way of updating the keys.

The initialization vector used with WEP is _____ bits long?

24

Explanation:
Within IEEE 802.11 networks, WEP (Wired Equivalent Protocol), which uses RC4 and a 24-bit IV,
could roll-around after a few hours. This method was replaced by TKIP (Temporal Key Integrity
Protocol) and which had a 48-bit IV value, and where a session key was used as the seed for the
S-box.

Select the the weaknesses in WEP from the list below. Select all that apply.

- Small value of IV

, - Susceptibility to Fluhrer, Mantin, Shamir attack
- Lack of message tampering identification
- Susceptibility to message replay

- Small value of IV
- Susceptibility to Fluhrer, Mantin, Shamir attack
- Lack of message tampering identification
- Susceptibility to message replay

Explanation:
WEP is weak from a number of viewpoints including:
• Small value of IV. This meant that it repeated within a reasonable time,
and the key could then be attacked.
• Construction of keys made it susceptible to the weak key attacks (FMS
attack).
• Lack of protection against message replay. There was no protection
against cipher streams being played back over the network.
• Lack of message tampering identification. The method did not support
the detection of message tampering.
• Directly used a master key. The method had no way of updating the keys.

WEP uses the block cipher RC4 configured for operation with 40-bit keys.

True or False

False

Explanation:
WEP uses the RC4 stream cipher. With this we have a 24-bit IV and a 40-bit key.

WPA uses RC4 with TKIP (Temporal Key Integrity Protocol) for encryption and has a ____-bit IV
value.

48
24
40
128

48

Explanation:

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
LectAziim Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
21
Member since
2 year
Number of followers
13
Documents
4143
Last sold
3 months ago
Dont stress yourself on study materials .LectAziim got it all

"Unlock your potential with our online writing store! Discover expert guidance, personalized feedback, and tools for every writer's journey. From crafting compelling essays to mastering creative storytelling, our platform offers interactive courses, one-on-one coaching, and resources tailored to your goals. Start writing your success story today with us!"

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions