An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system’s applications.
Which vulnerability allows the attacker to see the passwords being transmitted in clear text?
A . weak passwords for authentication
B . improper file security
C . software bugs on applications
D . unencrypted links for traffic
Answer: D
Explanation:
https://www.cisco.com/ELearning/bulk/public/celc/CRS/media/targets/resources_mod07/7_3_5_improving_security.pdf
Latest 350-701 Dumps Valid Version with 327 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund