It has been questioned if the wireless network component of your network is sufficiently secure. A vulnerability scan of the wireless network reveals that an old encryption protocol that was designed to mimic wired encryption is being used. What encryption protocol is being used?