Which of the following BEST describes the configurations the attacker exploited?
An attacker was easily able to log in to a company’s security camera by performing a basic online search for a setup guide for that particular camera brand and model.
Which of the following BEST describes the configurations the attacker exploited?
A . Weak encryption
B . Unsecure protocols
C . Default settings
D . Open permissions
Answer: C
Latest SY0-601 Dumps Valid Version with 396 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
                             Subscribe
                            
                        
                                            
                             Login                        
                    
                        0 Comments                    
                                        
                     Inline Feedbacks                    
                    View all comments