header bg

Question:

When you perform a vulnerability scan on a wireless network, you discover that it is using an old encryption protocol designed to mimic wired encryption if there have been claims in your network that the wireless network component is not secure sufficient?

A WEP
Explaination