Posted by: Pdfprep
Post Date: February 1, 2021
An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system’s applications.
Which vulnerability allows the attacker to see the passwords being transmitted in clear text?
A . weak passwords for authentication
B . improper file security
C . software bugs on applications
D . unencrypted links for traffic
Answer: D
Explanation:
https://www.cisco.com/ELearning/bulk/public/celc/CRS/media/targets/resources_mod07/7_3_5_improving_security.pdf
Leave a Reply