Notifications
Clear all
Topic starter
26/10/2022 5:36 pm
An organization has two systems in their DMZ that have an unencrypted link between them for communication.
The organization does not have a defined password policy and uses several default accounts on the systems.
The application used on those systems also have not gone through stringent code reviews .
Which vulnerability would help an attacker brute force their way into the systems?
- A . weak passwords
- B . lack of input validation
- C . missing encryption
- D . lack of file permission
Suggested Answer: C
Explanation:
Reference: https://tools.ietf.org/html/rfc3954
Explanation:
Reference: https://tools.ietf.org/html/rfc3954