Which of the following BEST describes the configurations the attacker exploited?
An attacker was easily able to log in to a company’s security camera by performing a basic online search for a setup guide for that particular camera brand and model.
Which of the following BEST describes the configurations the attacker exploited?
A . Weak encryption
B . Unsecure protocols
C . Default settings
D . Open permissions
Answer: C
Latest SY0-601 Dumps Valid Version with 396 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments