40.ll of the following are valid security issues that allow attacks on WEP, except:(A) 24-bit initialization vectors(B) Implementation of RC4(C) Repeated keys(D) Use of AES