An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system’s applications .
Which vulnerability allows the attacker to see the passwords being transmitted in clear text?
A . weak passwords for authentication
B . improper file security
C . software bugs on applications
D . unencrypted links for traffic
Answer: D
Explanation:
https://www.cisco.com/ELearning/bulk/public/celc/CRS/media/targets/resources_mod07/7_3_5_improving_secu
Latest 350-701 Dumps Valid Version with 327 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund