Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GSNA Topic 5 Question 45 Discussion

Actual exam question for GIAC's GSNA exam
Question #: 45
Topic #: 5
[All GSNA Questions]

Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WLANs). It has two components, authentication and encryption. It provides security equivalent to wired networks for wireless networks. WEP encrypts data on a wireless network by using a fixed secret key. Which of the following statements are true about WEP?

Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: C, D

The getSession() method of the HttpServletRequest interface returns the current session associated with the request, or creates a new

session if no session exists. The method has two syntaxes as follows:

public HttpSession getSession(): This method creates a new session if it does not exist.

public HttpSession getSession(boolean create): This method becomes similar to the above method if create is true, and returns the

current session if create is false. It returns null if no session exists.

Answer B is incorrect. The getSession(false) method returns a pre-existing session. It returns null if the

client has no session

associated with it.

Answer A and E are incorrect. There is no such method as getNewSession() in Java.


Contribute your Thoughts:

Tish
9 days ago
I'm not sure about C), but I think A) and D) are correct. WEP is known to have vulnerabilities, so it makes sense that tools like AirSnort can be used to discover keys.
upvoted 0 times
...
Quentin
10 days ago
Ah, the good old days of WEP. Back when we thought 24-bit IVs were secure and RC4 was cutting-edge. Time to move on to newer, stronger protocols!
upvoted 0 times
...
Laquanda
11 days ago
C is definitely false - WEP is widely known to have security flaws, while WPA offers much stronger protection. And D is spot on, there are plenty of tools out there that can crack WEP keys easily.
upvoted 0 times
...
Margret
11 days ago
I agree with Alise. A) and D) make sense because WEP does use the RC4 encryption algorithm and there are tools like AirSnort for discovering WEP keys.
upvoted 0 times
...
Alise
11 days ago
I think A) and D) are true about WEP.
upvoted 0 times
...
Noah
13 days ago
I agree with Trina, B) is true. But I also think D) is correct because tools like AirSnort can be used to discover WEP keys.
upvoted 0 times
...
Trina
14 days ago
I disagree, I believe B) is also true because the IV field of WEP is indeed only 24 bits long.
upvoted 0 times
...
Angella
16 days ago
WEP uses the RC4 encryption algorithm, so I'll definitely select A. The short IV length of 24 bits is also a known weakness, so B is correct too.
upvoted 0 times
Thurman
16 hours ago
A) WEP uses the RC4 encryption algorithm.
upvoted 0 times
...
...
Ngoc
25 days ago
I think A) and D) are true about WEP.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77