Question

Attackers can exploit WEPs weaknesses by ________.
A) using WEP cracking software
B) reading two messages encrypted with the same key
C) Both A and B
D) Neither A nor B

Answer

This answer is hidden. It contains 1 characters.