Notifications
Clear all
Topic starter
22/09/2022 5:56 am
An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system’s applications .
Which vulnerability allows the attacker to see the passwords being transmitted in clear text?
- A . weak passwords for authentication
- B . unencrypted links for traffic
- C . software bugs on applications
- D . improper file security
Suggested Answer: B