#IT-6310
Awesome StudentQuestion • Network Security

It could be exploited because of an encryption key that was vulnerable to decoding.

Answer

WEP 64