Which of the following BEST describes the configurations the attacker exploited?

An attacker was easily able to log in to a company’s security camera by performing a basic online search for a setup guide for that particular camera brand and model.

Which of the following BEST describes the configurations the attacker exploited?
A . Weak encryption
B . Unsecure protocols
C . Default settings
D . Open permissions

Answer: C

Latest SY0-601 Dumps Valid Version with 396 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments