An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system's applications. Which vulnerability allows the attacker to see the passwords being transmitted in clear text?
Question 23
A user has a device in the network that is receiving too many connection requests from multiple machines. Which type of attack is the device undergoing?
Question 24
Which two preventive measures are used to control cross-site scripting? (Choose two.)
Question 25
Which threat involves software being used to gain unauthorized access to a computer system?
Question 26
Which two capabilities does TAXII support? (Choose two.)
Question 27
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)
Question 28
Which algorithm provides encryption and authentication for data plane communication?
Question 29
DRAG DROP -Drag and drop the capabilities from the left onto the correct technologies on the right.Select and Place:
Question 30
Which two key and block sizes are valid for AES? (Choose two.)