Posted by: Pdfprep
Post Date: April 1, 2021
An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system’s applications .
Which vulnerability allows the attacker to see the passwords being transmitted in clear text?
A . weak passwords for authentication
B . improper file security
C . software bugs on applications
D . unencrypted links for traffic
Answer: D
Explanation:
https://www.cisco.com/ELearning/bulk/public/celc/CRS/media/targets/resources_mod07/7_3_5_improving_secu
Leave a Reply