Question: WEP has a long list of security vulnerabilities. Which of the following describes why the algorithm that was chosen by the WEP working group was not the best choice?
A. It�s a stream cipher, which has an inherent deficiency in integrity.
B. It�s a stream cipher, which has an inherent deficiency in key size.
C. It�s a stream cipher, which has an inherent deficiency in being vulnerable to man-in-the-middle attacks.
D. It�s a stream cipher, which has an inherent deficiency in being vulnerable to spoofing attacks.

Download pdf (with explanations) edition of this exam.